PERTIMO: A Model of Spatial Migration with Safe Access Permissions

被引:6
作者
Ciobanu, Gabriel [1 ,2 ]
Koutny, Maciej [3 ]
机构
[1] Romanian Acad, Inst Comp Sci, Iasi, Romania
[2] Alexandru Ioan Cuza Univ, Iasi 700505, Romania
[3] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
distributed systems; security; communication; migration; safe access permission; operational semantics; soundness; completeness; SYSTEMS;
D O I
10.1093/comjnl/bxu006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a process algebra with processes able to migrate between different explicit locations of a distributed environment defined by a number of distinct locations. We use timing constraints over local clocks to control migration and communication, together with local maximal concurrency in the way actions are executed. Two processes may communicate if they are present at the same location and, in addition, they have appropriate access permissions to communicate over a shared channel. Access permissions can be acquired or lost while moving from one location to another. Timing constraints coordinate and control both communication between processes and migration between locations. We completely characterize the situations in which a process is guaranteed to possess safe access permissions in all possible environments. In this way, one can design systems in which processes are not blocked (deadlocked) due to the lack of dynamically changing access permissions.
引用
收藏
页码:1041 / 1060
页数:20
相关论文
共 18 条
[1]   A Parametric Calculus for Mobile Open Code [J].
Ancona, Davide ;
Fagorzi, Sonia ;
Zucca, Elena .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (03) :3-22
[2]  
Baeten J. C. M., 1997, Fundamenta Informaticae, V29, P51
[3]  
BERGER M, 2002, THESIS IMPERIAL COLL
[4]  
Bettini L, 2005, LECT NOTES COMPUT SC, V3465, P29
[5]  
Bettini L, 2003, LECT NOTES COMPUT SC, V2874, P88
[6]  
Bugliesi M, 2007, ACM SIGPLAN NOTICES, V42, P251, DOI 10.1145/1190216.1190253
[7]   Secrecy and group creation [J].
Cardelli, L ;
Ghelli, G ;
Gordon, AD .
INFORMATION AND COMPUTATION, 2005, 196 (02) :127-155
[8]   Type-based distributed access control [J].
Chothia, T ;
Duggan, D ;
Vitek, J .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :170-184
[9]  
Ciobanu Gabriel, 2012, Software Engineering and Formal Methods. Proceedings of the 10th International Conference, SEFM 2012, P141, DOI 10.1007/978-3-642-33826-7_10
[10]  
Ciobanu Gabriel, 2011, FM 2011: Formal Methods. Proceedings 17th International Symposium on Formal Methods, P293, DOI 10.1007/978-3-642-21437-0_23