Secure Resource Access for Open Systems

نویسندگان

  • JAMES RIELY
  • MATTHEW HENNESSY
چکیده

In open distributed systems of mobile agents, where code from remote sites may run locally, protection of sensitive data and system resources is of paramount importance. We present a security-based typing system that provides such protection, using a mix of static and runtime typing; mobile agents are allowed access to local resources in accordance with security clearance. We formalize security violations as runtime errors and prove that, using our semantics, security violations cannot occur at “good” sites, i.e. sites under control of a particular administrative domain.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems

Highly computational resource sharing environments like grids pose major security issues. Secure interoperability has been a growing concern for such multi domain computing systems. Collaboration in such a diverse environment requires integration of all local policies to compose a global access control policy for controlling information and resource. Access control in such an environment is sti...

متن کامل

Designing Secure Business Processes Through Secure Activity Resource Coordination (SARC)

Business processes enable organizations to achieve business goals. Organizations require that their business processes exchange information in a secure environment. Access control mechanisms must be incorporated into the analysis, modeling, and design of business processes to prevent unauthorized access to information resources, to provide non-repudiation mechanisms, and to allow for segregatio...

متن کامل

Secure Resource Sharing Among Dynamic Ad-hoc Coalitions

In a dynamic coalition environment, organizations should be able to exercise their own local fine-grained access control policies while sharing resources with external entities. To facilitate such sharing, automatic, efficient and secure solutions are needed. In this paper, we briefly review the recently proposed approaches and discuss the open

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000