A Reusable, Secure Reference Monitor Based on the Aura Programming Language

نویسندگان

  • Luke Zarko
  • Steve Zdancewic
چکیده

Aura (Jia et al., 2008; Vaughan et al., 2008) is a dependently typed higher-order programming language. It was designed to facilitate the automation of institutional access control policy. Following the Curry-Howard isomorphism, Aura types correspond to logical propositions and its expressions correspond to proofs. At runtime, Aura programs manipulate evidence to construct these authorization proofs (which, thanks to the dependent type system, may reference live data). Aura’s typechecker is used to determine if proofs provided to support access to a restricted resource are properly formed in accordance to policy. In this way, a single reference monitor may be written that, when combined with application-specific rules, can be applied to many situations where securing a resource is required. This leads to a reduction in the size of the trusted computing base. We have extended Aura’s interpreter and typechecker to support transportation of proofs across the network, including support for cryptography and auditing as was originally imagined. In the process of doing so we have developed a method for describing RPC services in the Aura language and a configurable reference monitor that may host arbitrary Aura policies using .NET remoting. We have added an API that allows other .NET languages to make use of Aura code (either local or remote); this is a natural complement to the foreign function interface that already allowed Aura policies to access .NET objects. To demonstrate the applicability of the Aura platform to real-world problems, we have built a small Web service using C] that uses our API to communicate securely with its backend. Furthermore, this service allows decisions about login to be delegated (again within the Aura framework) to other trusted services.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Work ow Reference Monitor for Enforcing Purpose-Based Policies

Purpose is a key concept in privacy policies. Based on the purpose framework developed in our earlier work [11] we present an access control model for a work ow-based information system in which a work ows reference monitor ( WfRM ) enforces purpose-based policies. We use a generic access control policy language and show how it can be connected to the purpose modal logic language ( PML ) to lin...

متن کامل

Extending Aura with Csound Opcodes

Languages for music audio processing typically offer a large assortment of unit generators. There is great duplication among different language implementations, as each language must implement many of the same (or nearly the same) unit generators. Csound has a large library of unit generators and could be a useful source of reusable unit generators for other languages or for direct use in appli...

متن کامل

Secure Compilation Using Micro-Policies

Micro-policies are instruction-level security monitoring mechanisms based on fine-grained metadata tags. In this talk, we will show how targeting a micro-policy machine can help in building an efficient secure compiler for a simple object-oriented language. We will present the challenges of devising a fully abstract compiler for this language, and discuss the additional challenges that arise wh...

متن کامل

Robust Membership Management for Ad-hoc Groups

In ad-hoc networks, the network nodes or users often form peer groups. The members of a group may share an application, a physical location, or administrative tasks. Defining who is a member of the group is also the first step towards establishing a shared secret key for secure communications. Group membership management involves adding and removing nodes in the group, as well as a method for a...

متن کامل

The Generation of Reusable and Secure E-learning Content

With the advent of digital technologies and e-learning techniques we need to optimize digital and particular e-learning content. In this paper , a new reusable method with watermarking scheme based on Sharable content object reference model named SCORM standard is proposed. experimental results are shown to demonstrate the validity of the proposed scheme. There are four major stages in the cont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009