A typed theory for access control and information flow control in mobile systems

被引:0
|
作者
Wang, LB [1 ]
Chen, KF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a novel security type system for the pi-calculus in which a fine-grained access control mechanism is guaranteed by static type checking and secure information flow can be characterized by a new form of non-interference property based on typed behavioral equivalence. In this paper, we present the syntax, subtyping rules, and typing rules of the type system, and explain how the secure data access can be controlled by typing. And then we elaborate a framework of typed level bisimulation to construct the secure information flow property named as non-interference at level. Moreover, some results are presented to indicate that our theory is an efficient enforceable model to support the specification and analysis of secure mobile systems.
引用
收藏
页码:154 / 165
页数:12
相关论文
共 50 条
  • [1] Dependent Type Theory for Verification of Information Flow and Access Control Policies
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
  • [2] A typed access control model for CORBA
    Brose, G
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 88 - 105
  • [3] Access Control of Federated Information Systems
    Poniszewska-Maranda, Aneta
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 119 - 130
  • [4] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [5] Providing flexible access control to an information flow control model
    Chou, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 425 - 439
  • [6] Resource access control in systems of mobile agents
    Hennessy, M
    Riely, J
    [J]. INFORMATION AND COMPUTATION, 2002, 173 (01) : 82 - 120
  • [7] Control Operation Flow for Mobile Access Control with the Use of MABAC Model
    Majchrzycka, Aneta
    Poniszewska-Maranda, Aneta
    [J]. TOWARDS A SYNERGISTIC COMBINATION OF RESEARCH AND PRACTICE IN SOFTWARE ENGINEERING, 2018, 733 : 179 - 192
  • [8] Session Types for Access and Information Flow Control
    Capecchi, Sara
    Castellani, Ilaria
    Dezani-Ciancaglini, Mariangiola
    Rezk, Tamara
    [J]. CONCUR 2010 - CONCURRENCY THEORY, 2010, 6269 : 237 - +
  • [9] Access Control and Information Flow in Transactional Memory
    Cohen, Ariel
    van der Meyden, Ron
    Zuck, Lenore D.
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 316 - +
  • [10] Fine granularity access rights for information flow control in object oriented systems
    Maamir, Allaoua
    Fellah, Abdelaziz
    Salem, Lina A.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 122 - 128