A type system for Discretionary Access Control

被引:8
|
作者
Bugliesi, Michele [1 ]
Colazzo, Dario [2 ]
Crafa, Silvia [3 ]
Macedonio, Damiano [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, I-30172 Venice, Italy
[2] Univ Paris Sud, LRI, F-91405 Orsay, France
[3] Univ Padua, Dipartimento Matemat Pura & Applicata, I-35121 Padua, Italy
关键词
RESOURCE ACCESS; LANGUAGE;
D O I
10.1017/S0960129509007762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on the selective distribution of capabilities to selected classes of principals. We study a type-based theory of DAC models for a process calculus that extends Cardelli, Ghelli and Gordon's pi-calculus with groups (Cardelli et al. 2005). In our theory, groups play the role of principals and form the unit of abstraction for our access control policies, and types allow the specification of fine-grained access control policies to govern the transmission of names, bound the (iterated) re-transmission of capabilities and predicate their use on the inability to pass them to third parties. The type system relies on subtyping to achieve a selective distribution of capabilities to the groups that control the communication channels. We show that the typing and subtyping relationships Of the calculus are decidable. We also prove a type safety result, showing that in well-typed processes all names: (i) flow according to the access control policies specified by their types; and (ii) are received at the intended sites with the intended capabilities. We illustrate the expressive power and the flexibility of the typing system using several examples.
引用
收藏
页码:839 / 875
页数:37
相关论文
共 50 条
  • [1] Type based discretionary access control
    Bugliesi, M
    Colazzo, D
    Crafa, S
    [J]. CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239
  • [2] A generic discretionary access control system for reuse frameworks
    Wei, LK
    Jarzabek, S
    [J]. TWENTY-SECOND ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE - PROCEEDINGS, 1998, : 356 - 361
  • [3] On safety in discretionary access control
    Li, NH
    Tripunitara, MV
    [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 96 - 109
  • [4] The complexity of discretionary access control
    Dranger, Stephen
    Sloan, Robert H.
    Solworth, Jon A.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 405 - 420
  • [5] Trojan Horse Resistant Discretionary Access Control
    Mao, Ziqing
    Li, Ninghui
    Chen, Hong
    Jiang, Xuxian
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 237 - 246
  • [6] Towards a mechanism for discretionary overriding of access control
    Rissanen, Erik
    Firozabadi, Babak Sadighi
    Sergot, Marek
    [J]. SECURITY PROTOCOLS, 2006, 3957 : 312 - 323
  • [7] Discretionary overriding of access control in the privilege calculus
    Rissanen, E
    Firozabadi, BS
    Sergot, M
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 219 - 232
  • [8] A Discretionary Delegation Framework for Access Control Systems
    Khan, M. Fahim Ferdous
    Sakamura, Ken
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 865 - 882
  • [9] DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS
    BORN, E
    STIEGLER, H
    [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 437 - 450
  • [10] Discretionary Access Control with the Administrative Role Graph Model
    Wang, He
    Osborn, Sylvia L.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 151 - 156