Preliminary Proceedings 5 th International Workshop on Security Issues in Concurrency ( SecCo ’ 07 )
نویسندگان
چکیده
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may be compromised, that is, some nodes of the system and their security credentials may be under the control of an attacker. To help predict and bound the impact of such partial compromise, we advocate logic-based policies that explicitly record dependencies between principals. We propose a conformance criterion, ”safety despite compromised principals”, such that an invalid authorization decision at an uncompromised node can arise only when nodes on which the decision logically depends are compromised. We formalize this criterion in the setting of a process calculus, and present a verification technique based on a type system. Hence, we can verify policy conformance of code that uses a wide range of the security mechanisms found in distributed systems, ranging from secure channels down to cryptographic primitives, including secure hashes, encryption, and public-key signatures. 1 Joint work with Andrew Gordon and Sergio Maffeis. Symbolic bisimulation for the applied pi calculus (extended abstract) ? Stéphanie Delaune, Steve Kremer, Mark Ryan a LORIA, CNRS & INRIA, Nancy, France b LSV, CNRS & ENS de Cachan & INRIA, France c School of Computer Science, University of Birmingham, UK
منابع مشابه
Preliminary Proceedings 13 th International Workshop on Expressiveness in Concurrency EXPRESS ’ 06 Bonn , Germany 26 August 2006 Editors : Roberto Amadio
We give an overview over recent work on fairness in reactive and concurrent systems, including an abstract characterisation of fairness. We also derive a notion of a fairly correct system and sketch its application.
متن کاملPreliminary Proceedings of the 8 th International Workshop on Expressiveness in Concurrency EXPRESS ’ 01 Aalborg , Denmark , August 20 , 2001
We show how the tree-automata techniques proposed by Lugiez and Schnoebelen apply to the reachability analysis of RPPS systems. Using these techniques requires that we express the states of RPPS systems in a tailor-made process rewrite system where reachability is a relation recognizable by nite tree-automata.
متن کاملSCIENCE CHINA 2008 ( Concurrency metHods : Issues aNd Applications )
These are proceedings of the CHINA 2008 Workshop (Concurrency metHods: Issues aNd Applications). The workshop was a satellite event of the 29th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency, co-located with the 8th International Conference on Application of Concurrency to System Design, held in Xian, China, in June 2008. © 2008 University of Ne...
متن کاملMulticomputer Object Stores: The Multicomputer Texas Experiment
The paper is about design of object stores for distributed memory computers. Problems of distribution within such stores areThis paper appeared in the proceedings of the Seventh International Workshop on Persistent Object Systems described through the design of Multicomputer Texas, a system derived from the Texas store [8] and implemented on a scalable multicomputer (a Fujitsu AP1000). Problems...
متن کاملar X iv : n uc l - th / 9 30 20 03 v 1 5 F eb 1 99 3 ISN 93 - 17 SPIN AND FLAVOUR : CONCLUDING REMARKS 1
We review some of the salient results presented at this Workshop, together with some comments on the underlying physics, and the proposed facilities for future experiments. ISN 93–17 February 5, 2008. Invited talk at the Workshop on Spin and Flavour in Hadronic and Electromagnetic Interactions, Turin, September 1992, to appear in the Proceedings SPIN AND FLAVOUR: CONCLUDING REMARKS
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007