DRAFT February 1979 2 Security - and Modularity

نویسنده

  • Henry Lieberman
چکیده

This paper addresses theoretical issues involved for the implementation of security and modularity in concurrent systems. It explicates the theory behind a mechanism for safely delegating messages to shared handlers in order to increase the modularity of concurrent systems. Our mechanism has the property that the actions caused by delegated messages are atomic. That is the handling of a message delegated by a client actor appears to be indivisible to other users of the actor. Our mechanism for delegating communications is a generalization suitable for use in concurrent systems of the subclass mechanism of SIMULA. Our mechanism has the benefit that it easily lends itself to the implementation of efficient flexible access control mechanisms in distributed systems. It is a generalization of the protection mechanisms provided by capability-based systems, access control lists, and the access control mechanisms provided by PDP-10 SIMULA. A.I. Laboratory Working Papers are produced for internal circulation, and may contain information that is, for example, too preliminary or too detailed for formal publication. Although some will be given a limited external distribution, it is not intended that they should be considered papers to which reference can be made in the literature. This report describes research done at the Artificial Intelligence Laboratory of the Massachusetts Institute of Technology. Support for this research was provided in part by the Office of Naval Research of the Department of Defense under Contract N00014-75-C-0522. -MASSACHUSETTS INSTITUTE OF TECHNOLOGY 197M Security and Modularity II -INTRODUCTION The implementation of a robust concurrent system requires very careful design. Not many conceptual or programming tools are provided to perform such a task. We address this problem by presenting some mechanisms to better structure a concurrent system. They are centered around a primitive for synchronization in message-based systems which is a further development of serializers [Atkinson and Hewitt 19781. This primitive deals with problems of protection and modularity in the implementation of concurrent systems. Protection is achieved by allowing message constructors to be given to different users. Guardians are abstractions that can implement the following functions for their resources: scheduling access, providing protection, and implementing recovery from hardware failures which manifest themselves as time-outs or data with an incorrect checksum. A guardian of protected resources will only perform tasks for messages which have been constructed by the appropriate message constructors. In a distributed system this constraint can be enforced using cryptography. Each of these messages understood by a guardian corresponds to an operation which the resource can perform. A message constructor for one of these messages can be communicated to those who are allowed to perform operation associated with the message. Serializers facilitate the implementation of efficient flexible access protection that subsumes the abilities of both capability based systems and access control systems. Two important mechanisms to support modularity in our system are delegation and inheritance. Both of them are derived from a generalization of the subclass mechanism in SIMULA. *1 DRAFT February 1979

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining Overlapping Communities in Real-world Networks Based on Extended Modularity Gain

Detecting communities plays a vital role in studying group level patterns of a social network and it can be helpful in developing several recommendation systems such as movie recommendation, book recommendation, friend recommendation and so on. Most of the community detection algorithms can detect disjoint communities only, but in the real time scenario, a node can be a member of more than one ...

متن کامل

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol

We analyze the handshake protocol of TLS 1.3 draft-ietf-tls-tls13-10 (published October 2015). This continues and extends our previous analysis (CCS 2015, Cryptology ePrint Archive 2015) of former TLS 1.3 drafts (draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based). Here we show that the full (EC)DHE Diffie–Hellman-based handshake of draft-10 is also secure in the multi-stage key exchange...

متن کامل

Reports of the 1979 Advisory Council on Social Security.

The 1979 Advisory Council on Social Security, appointed in February 1978, was charged with reviewing all aspects of the social security program, particularly financing, the general benefit structure, universal coverage, disability insurance, and the treatment of women and families. After 17 meetings and six days of public hearings in Detroit, Los Angeles, Miami, New Orleans, and Washington, D.C...

متن کامل

Abstract Software Specifications, 1979 Copenhagen Winter School, January 22 - February 2, 1979, Proceedings

Software Specifications 1979 Copenhagen Winter School January 22 February 2 1979 Proceedings Find loads of the book catalogues in this site as the choice of you visiting this page. You can also join to the website book library that will show you numerous books from any types. Literature, science, politics, and many more catalogues are presented to offer you the best book to find. The book that ...

متن کامل

Internet - Draft Anti - SPIT Policies February 2007

SPAM, defined as sending unsolicited messages to someone in bulk, might be a problem on SIP open-wide deployed networks. The responsibility for filtering or blocking calls can belong to different elements in the call flow and may depend on various factors. This document defines an authorization based policy language that allows end users to upload anti-SPIT policies to intermediaries, such as S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008