Towards a behavioural theory of access and mobility control in distributed systems

被引:18
|
作者
Hennessy, M [1 ]
Merro, M
Rathke, J
机构
[1] Univ Sussex, Brighton BN1 9QH, E Sussex, England
[2] Univ Verona, I-37100 Verona, Italy
关键词
distributed picalculus; access control; capability types; mobility control; contextual equivalence; bisimulations;
D O I
10.1016/j.tcs.2003.12.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We define a typed bisimulation equivalence for the language DPI, a distributed version of the pi-calculus in which processes may migrate between dynamically created locations. It takes into account resource access policies, which can be implemented in DPI using a novel form of dynamic capability types. The equivalence, based on typed actions between configurations, is justified by showing that it is fully abstract with respect to a natural distributed version of a contextual equivalence. In the second part of the paper we study the effect of controlling the migration of processes. This affects the ability to perform observations at specific locations, as the observer may be denied access. We show how the typed actions can be modified to take this into account, and generalise the full-abstraction result to this more delicate scenario. (C) 2003 Published by Elsevier B.V.
引用
收藏
页码:615 / 669
页数:55
相关论文
共 50 条
  • [31] Role signatures for access control in open distributed systems
    Crampton, Jason
    Lim, Hoon Wei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 205 - +
  • [32] Weighted Access Control Policies Cohabitation in Distributed Systems
    El Kandoussi, Asmaa
    El Bakkali, Hanan
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 350 - 360
  • [34] Geometric theory of control of systems with distributed parameters
    Russian Acad of Sciences, Moscow, Russia
    J Comput Syst Sci Int, 5 (1-40):
  • [35] Towards Dynamic Access Control for Healthcare Information Systems
    Rostad, Lillian
    Nytro, Oystein
    EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 703 - 708
  • [36] Towards an Access Regime for Mobility Data
    Picht, Peter Georg
    IIC-INTERNATIONAL REVIEW OF INTELLECTUAL PROPERTY AND COMPETITION LAW, 2020, 51 (08) : 940 - 976
  • [37] Towards an Access Regime for Mobility Data
    Peter Georg Picht
    IIC - International Review of Intellectual Property and Competition Law, 2020, 51 : 940 - 976
  • [38] TOWARDS A BEHAVIOURAL THEORY OF FINANCIAL ACCOUNTING
    KAPPLER, E
    MANAGEMENT INTERNATIONAL REVIEW, 1973, 13 (2-3) : 37 - 49
  • [39] Access control based on code identity for open distributed systems
    Cirillo, Andrew
    Riely, James
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 169 - +
  • [40] A Trust and Context Based Access Control Model for Distributed Systems
    Feng, Fujun
    Lin, Chuang
    Peng, Dongsheng
    Li, Junshan
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +