Towards a behavioural theory of access and mobility control in distributed systems

被引:18
|
作者
Hennessy, M [1 ]
Merro, M
Rathke, J
机构
[1] Univ Sussex, Brighton BN1 9QH, E Sussex, England
[2] Univ Verona, I-37100 Verona, Italy
关键词
distributed picalculus; access control; capability types; mobility control; contextual equivalence; bisimulations;
D O I
10.1016/j.tcs.2003.12.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We define a typed bisimulation equivalence for the language DPI, a distributed version of the pi-calculus in which processes may migrate between dynamically created locations. It takes into account resource access policies, which can be implemented in DPI using a novel form of dynamic capability types. The equivalence, based on typed actions between configurations, is justified by showing that it is fully abstract with respect to a natural distributed version of a contextual equivalence. In the second part of the paper we study the effect of controlling the migration of processes. This affects the ability to perform observations at specific locations, as the observer may be denied access. We show how the typed actions can be modified to take this into account, and generalise the full-abstraction result to this more delicate scenario. (C) 2003 Published by Elsevier B.V.
引用
收藏
页码:615 / 669
页数:55
相关论文
共 50 条
  • [41] OPTIMISING DISTRIBUTED ACCESS CONTROL SYSTEMS USING ASSOCIATIVE RULES
    Gams, Matjaz
    Vlad, Madalin Stefan
    Mircevska, Violeta
    Cosoi, Alexandru Catalin
    Corduneanu, Maria
    Kolbe, Mitja
    ANNALS OF DAAAM FOR 2009 & PROCEEDINGS OF THE 20TH INTERNATIONAL DAAAM SYMPOSIUM, 2009, 20 : 1413 - 1414
  • [42] CONTEXT-DEPENDENT ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    STRACK, H
    LAM, KY
    COMPUTER SECURITY, 1993, 37 : 137 - 155
  • [43] Behavior-based access control for distributed healthcare systems
    Yarmand, Mohammad
    Sartipi, Kamran
    Down, Douglas
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 1 - 39
  • [44] Efficient proving for practical distributed access-control systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 19 - +
  • [45] A semantic-based access control mechanism for distributed systems
    Sadeghi, Mersedeh
    Sartor, Luca
    Rossi, Matteo
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 1864 - 1873
  • [46] Portunus: Re-imagining Access Control in Distributed Systems
    Ladd, Watson
    Verma, Tanya
    Venema, Marloes
    Faz-Hernandez, Armando
    McMillion, Brendan
    Wildani, Avani
    Nick, Cloudflare
    PROCEEDINGS OF THE 2023 USENIX ANNUAL TECHNICAL CONFERENCE, 2023, : 35 - 52
  • [47] Capability-based access control model for distributed systems
    Zheng, Qingji
    Chen, Kefei
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 104 - 109
  • [48] SPECIFYING DISCRETIONARY ACCESS-CONTROL POLICY FOR DISTRIBUTED SYSTEMS
    MOFFETT, J
    SLOMAN, M
    TWIDLE, K
    COMPUTER COMMUNICATIONS, 1990, 13 (09) : 571 - 580
  • [49] Research on Policy Domain Access Control Model in Distributed Systems
    Wu, Xian
    Qian, Peide
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 122 - +
  • [50] An adaptive control mechanism for access control in large-scale distributed systems
    Jiang, Xiaofeng
    Li, Jun
    Xi, Hongsheng
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2014, 36 (01) : 26 - 37