A type discipline for authorization in distributed systems

被引:40
作者
Fournet, Cedric
Gordon, Andrew D.
Maffeis, Sergio
机构
来源
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS | 2007年
关键词
D O I
10.1109/CSF.2007.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may be compromised, that is, some nodes of the system and their security credentials may be under the control of an attacker To help predict and bound the impact of such partial compromise, we advocate logic-based policies that,explicitly record dependencies between principals. We propose a conformance criterion, safety despite compromised principals, such that an invalid authorization decision at an uncompromised node can arise only when nodes on which the decision logically depends are compromised. We formalize this criterion in the setting of a process calculus, and present a verification technique based on a type system. Hence, we can verify policy conformance of code that uses a wide range of the security mechanisms found in distributed systems, ranging from secure channels down to cryptographic primitives, including encryption and public-key signatures.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 49 条
[1]   Analyzing security protocols with secrecy types and logic programs [J].
Abadi, M ;
Blanchet, B .
JOURNAL OF THE ACM, 2005, 52 (01) :102-146
[2]   A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J].
ABADI, M ;
BURROWS, M ;
LAMPSON, B ;
PLOTKIN, G .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04) :706-734
[3]   Secrecy types for asymmetric communication [J].
Abadi, M ;
Blanchet, B .
THEORETICAL COMPUTER SCIENCE, 2003, 298 (03) :387-415
[4]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[5]  
ABADI M, 1999, 26 ACM S PRINC PROGR, P147
[6]   Access Control in a Core Calculus of Dependency [J].
Abadi, Martin .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 172 (5-31) :5-31
[7]  
[Anonymous], 1996, LNCS
[8]  
APPEL AW, 1999, 6 ACM C COMP COMM SE
[9]  
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[10]  
BAUER L, 2003, THESIS PRINCETON U