Declarative secure distributed information systems

被引:2
|
作者
Zhou, Wenchao [1 ]
Tao, Tao [2 ]
Loo, Boon Thau [2 ]
Mao, Yun [3 ]
机构
[1] Georgetown Univ, Washington, DC 20057 USA
[2] Univ Penn, Philadelphia, PA 19104 USA
[3] AT&T Labs Res, Florham Pk, NJ 07932 USA
关键词
Declarative networking; Secure query processing; Secure distributed information systems; Distributed trust management;
D O I
10.1016/j.cl.2012.09.002
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a unified declarative platform for specifying, implementing, and analyzing secure networked information systems. Our work builds upon techniques from logic-based trust management systems and declarative networking. We make the following contributions. First, we propose the Secure Network Datalog (SeNDlog) language that unifies Binder, a logic-based language for access control in distributed systems, and Network Datalog, a distributed recursive query language for declarative networks. SeNDlog enables network routing, information systems, and their security policies to be specified and implemented within a common declarative framework. Second, we extend existing distributed recursive query processing techniques to execute SeNDlog-programs that incorporate secure communication via authentication and encryption among untrusted nodes. Third, we demonstrate the use of user-defined cryptographic functions for customizing the authentication and encryption mechanisms used for securing protocols. Finally, using a local cluster and the PlanetLab testbed, we perform a detailed performance study of a variety of secure networked systems implemented using our platform. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 24
页数:24
相关论文
共 50 条
  • [41] Secure Distributed Deduplication Systems with Improved Reliability
    Li, Jin
    Chen, Xiaofeng
    Huang, Xinyi
    Tang, Shaohua
    Xiang, Yang
    Hassan, Mohammad Mehedi
    Alelaiwi, Abdulhameed
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3569 - 3579
  • [42] Growing Secure Distributed Systems From a Spore
    Basagalar, Yunus
    Lekakis, Vassilios
    Keleher, Pete
    [J]. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 546 - 555
  • [43] A secure transaction environment for workflows in distributed systems
    Wietrzyk, VI
    Takizawa, M
    Orgun, MA
    Varadharajan, V
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 198 - 205
  • [44] On Secure Distributed Storage Systems with Exact Repair
    Tandon, Ravi
    Amuru, SaiDhiraj
    Clancy, T. Charles
    Buehrer, R. Michael
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3908 - 3912
  • [45] Maintaining Secure and Reliable Distributed Control Systems
    Sleptchenko, Andrei
    Johnson, M. Eric
    [J]. INFORMS JOURNAL ON COMPUTING, 2015, 27 (01) : 103 - 117
  • [46] A CIM model for secure information systems
    Lammari, Nadira
    Bucumi, Jean-Sylvain
    Akoka, Jacky
    Wattiau, Isabelle
    [J]. KNOWLEDGE MANAGEMENT AND INNOVATION: A BUSINESS COMPETITIVE EDGE PERSPECTIVE, VOLS 1-3, 2010, : 1690 - 1698
  • [47] Secure information systems engineering: a manifesto
    Mouratidis, Haralambos
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 27 - 41
  • [48] Intelligent distributed information systems
    Badica, C.
    Mangioni, G.
    Rahimi, S.
    [J]. INFORMATION SCIENCES, 2010, 180 (10) : 1779 - 1780
  • [49] The physics of distributed information systems
    Aurell, Erik
    [J]. ELC INTERNATIONAL MEETING ON INFERENCE, COMPUTATION, AND SPIN GLASSES (ICSG2013), 2013, 473
  • [50] Optimization in distributed information systems
    Zhu, Xiaomin
    Yang, Laurence T.
    Jiang, Hai
    Thulasiraman, Parimala
    Di Martino, Beniamino
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 26 : 305 - 306