A Framework for the Analysis of Access Control Models for Interactive Mobile Devices

被引:0
作者
Manuel Crespo, Juan [1 ,2 ]
Betarte, Gustavo [3 ]
Luna, Carlos [3 ]
机构
[1] Univ Nacl Rosario, FCEIA, RA-2000 Rosario, Santa Fe, Argentina
[2] IMDEA Software, Madrid, Spain
[3] Univ Republic, Inst Computac, Montevideo, Uruguay
来源
TYPES FOR PROOFS AND PROGRAMS | 2009年 / 5497卷
关键词
Access control models; mobile devices; formal proofs;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Java Micro Edition platform (JME), a Java enabled technology, provides the Mobile Information Device Profile (MIDP) standard that facilitates applications development and specifies a security model for the controlled access to sensitive resources of the device. The model builds upon the notion of protection domain, which in turn can be grasped as a set of permissions. An alternative model has been proposed that extends MIDP's by introducing permissions with multiplicities and adding flexibility to the way in which permissions are granted by the user of the device and used by the applications running on it. This paper presents a framework, formalized using the proof-assistant Coq, suitable for defining and comparing the access control policies that can be enforced by (variants of) those security models and to prove desirable properties they should satisfy. The proofs of some of those properties are also stated and discussed in this work.
引用
收藏
页码:49 / +
页数:2
相关论文
共 12 条
[1]  
[Anonymous], 2006, COQ PROOF ASS REF MA
[2]  
BARTOLETTI M, 2001, DESIGN IMPLEMENTATIO, V54
[3]  
Beguelin SZ, 2007, LECT NOTES COMPUT SC, V4691, P220
[4]  
Besson F., 2001, Journal of Computer Security, V9, P217
[5]  
Besson F, 2006, LECT NOTES COMPUT SC, V4189, P110
[6]   THE CALCULUS OF CONSTRUCTIONS [J].
COQUAND, T ;
HUET, G .
INFORMATION AND COMPUTATION, 1988, 76 (2-3) :95-120
[7]  
COQUAND T, 1990, LECT NOTES COMPUT SC, V417, P50
[8]   Verification of control flow based security properties [J].
Jensen, T ;
Le Métayer, D ;
Thorn, T .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :89-103
[9]  
*JSR 118 EXP GROUP, 2002, MOB INF DEV PROF JAV
[10]  
*JSR 37 EXP GROUP, 2000, MOB INF DEV PROF JAV