Type-based distributed access control

The key-based decentralized label model (KDLM) is a type system that combines a weak form of information flow control, termed distributed access control in the article, with typed cryptographic operations. The motivation is to have a type system that ensures access control while giving the application the responsibility to secure network communications, and to do this safely. KDLM introduces the notion of declassification certificates to support the declassification of encrypted data.

[1]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[2]  Benjamin C. Pierce,et al.  Logical relations for encryption , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[3]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[4]  Andrew C. Myers,et al.  Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[5]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[6]  Martín Abadi,et al.  Secure communications processing for distributed languages , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[7]  Martín Abadi,et al.  Secrecy by Typing inSecurity Protocols , 1997, TACS.

[8]  Butler W. Lampson,et al.  Simple Public Key Certificate , 1998 .

[9]  Martín Abadi,et al.  Authentication in the Taos operating system , 1993, SOSP '93.

[10]  Martín Abadi,et al.  Authentication in distributed systems: theory and practice , 1991, SOSP '91.

[11]  Jan Vitek,et al.  Secure composition of untrusted code: box π, wrappers, and causality types , 2003 .

[12]  Peeter Laud,et al.  Handling Encryption in an Analysis for Secure Information Flow , 2003, ESOP.

[13]  Martín Abadi,et al.  Secrecy by typing in security protocols , 1999, JACM.

[14]  Martín Abadi,et al.  Access Control Based on Execution History , 2003, NDSS.

[15]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[16]  Andrew C. Myers,et al.  Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[17]  Dominic Duggan Cryptographic types , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[18]  Andrew C. Myers,et al.  Untrusted hosts and confidentiality: secure program partitioning , 2001, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[19]  John C. Mitchell,et al.  Abstract types have existential types , 1985, POPL.

[20]  Geoffrey Smith,et al.  A Type-Based Approach to Program Security , 1997, TAPSOFT.

[21]  Andrew D. Gordon,et al.  Authenticity by typing for security protocols , 2003 .

[22]  Alley Stoughton Access Flow: A Protection Model which Integrates Access Control and Information Flow , 1981, 1981 IEEE Symposium on Security and Privacy.

[23]  Martín Abadi,et al.  Authentication in the Taos operating system , 1994, TOCS.

[24]  Luca Cardelli,et al.  Secrecy and group creation , 2005, Inf. Comput..

[25]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[26]  Jon G. Riecke,et al.  The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.

[27]  Martín Abadi,et al.  Authentication primitives and their compilation , 2000, POPL '00.

[28]  John C. Mitchell,et al.  Abstract types have existential type , 1988, TOPL.

[29]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[30]  Jan Vitek,et al.  A Calculus of Secure Mobile Computations ( Preliminary Report ) , 1998 .

[31]  George C. Necula,et al.  Safe kernel extensions without run-time checking , 1996, OSDI '96.

[32]  Martín Abadi,et al.  A Top-Down Look at a Secure Message , 1999, FSTTCS.

[33]  James Riely,et al.  Trust and partial typing in open systems of mobile agents , 1999, POPL '99.

[34]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[35]  Andrew C. Myers,et al.  Protecting privacy using the decentralized label model , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[36]  Jan Vitek,et al.  Secure composition of untrusted code: wrappers and causality types , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[37]  James Riely,et al.  Type-Safe Execution of Mobile Agents in Anonymous Networks , 1998, ECOOP Workshops.

[38]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[39]  Andrew D. Gordon,et al.  Types and effects for asymmetric cryptographic protocols , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[40]  Bruno Blanchet,et al.  From Secrecy to Authenticity in Security Protocols , 2002, SAS.

[41]  Sylvain Conchon,et al.  Information flow inference for free , 2000, ICFP '00.

[42]  François Pottier A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.