Secure Implementations of Typed Channel Abstractions (Extended Abstract)

被引:0
|
作者
Bugliesi, Michele [1 ]
Giunti, Marco [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, Venice, Italy
关键词
Typed Behavioral Theories; Language Encodings; Full Abstraction;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The challenges hidden in the implementation of high-level process calculi into low-level environments are well understood [3]. This paper develops a secure implementation of a typed pi calculus, in which capability types are employed to realize the policies for the access to communication channels. Our implementation compiles high-level processes of the pi-calculus into low-level principals of a cryptographic process calculus based on the applied-pi calculus [1]. In this translation, the high-level type capabilities are implemented as term capabilities protected by encryption keys only known to the intended receivers. As such, the implementation is effective even when the compiled, low-level principals are deployed in open contexts for which no assumption on trust and behavior may be made. Our technique and results draw on, and extend, previous work on secure implementation of channel abstractions in a dialect of the join calculus [2]. In particular, our translation preserves the forward secrecy of communications in a calculus that includes matching and supports the dynamic exchange of write and read access-rights among processes. We establish the adequacy and full abstraction of the implementation by contrasting the untyped equivalences of the low-level cryptographic calculus, with the typed equivalences of the high-level source calculus.
引用
收藏
页码:251 / 262
页数:12
相关论文
共 50 条
  • [1] Secure implementations of typed channel abstractions
    Bugliesi, Michele
    Giunti, Marco
    ACM SIGPLAN NOTICES, 2007, 42 (01) : 251 - 262
  • [2] Secure implementations for typed session abstractions
    Corin, Ricardo
    Denielou, Pierre-Malo
    Fournet, Cedric
    Bhargavan, Karthikeyan
    Leifer, James
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 170 - 186
  • [3] Secure implementation of channel abstractions
    Abadi, M
    Fournet, C
    Gonthier, G
    INFORMATION AND COMPUTATION, 2002, 174 (01) : 37 - 83
  • [4] Secure implementation of channel abstractions
    Abadi, M
    Fournet, C
    Gonthier, G
    THIRTEENTH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1998, : 105 - 116
  • [5] EXTENDED INITIALITY FOR TYPED ABSTRACT SYNTAX
    Ahrens, Benedikt
    LOGICAL METHODS IN COMPUTER SCIENCE, 2012, 8 (02)
  • [6] Security Abstractions and Intruder Models (Extended Abstract)
    Bugliesi, Michele
    Focardi, Riccardo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 242 (01) : 99 - 112
  • [7] Matching typed and untyped readability (Extended abstract)
    Laboratory for the Foundations of Computer Science, JCMB, The. King's Buildings, May field Road, Edinburgh EH9 3JZ, United Kingdom
    Electron. Notes Theor. Comput. Sci., 1600, (109-132):
  • [8] Provably secure steganography - (Extended abstract)
    Hopper, NJ
    Langford, J
    von Ahn, L
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 77 - 92
  • [9] Localizability of fairness constraints and their distributed implementations - Extended abstract
    Joung, YJ
    CONCUR'99: CONCURRENCY THEORY, 1999, 1664 : 336 - 351
  • [10] Typed Event Structures and the pi-Calculus Extended Abstract
    Varacca, Daniele
    Yoshida, Nobuko
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 158 (01) : 373 - 397