A programming notation is introduced that can be used for protecting secrecy and integrity of data in global computing applications. The approach is based on the explicit annotations of data and network nodes. Data are tagged with information about the allowed movements, network nodes are tagged with information about the nodes that can send data and spawn processes to them. The annotations are used to confine movements of data and processes. The approach is illustrated by applying it to three paradigmatic calculi for global computing, namely CKLAIM (a calculus at the basis of CKLAIM), D pi (a distributed version of the pi-calculus) and Mobile Ambients Calculus. For all of these formalisms, it is shown that their semantics guarantees that computations proceed only while respecting confinement constraints. Namely, it is proven that, after successful static type checking, data can reside at and cross only authorised nodes. "Local" formulations of this property where only relevant subnets type check are also presented. Finally, the theory is tested by using it to model secure behaviours of a UNIX-like multiuser system. (c) 2006 Elsevier B.V. All rights reserved.

Confining data and processes in global computing applications / Rocco De, Nicola; Gorla, Daniele; Rosario, Pugliese. - In: SCIENCE OF COMPUTER PROGRAMMING. - ISSN 0167-6423. - STAMPA. - 63:1(2006), pp. 57-87. (Intervento presentato al convegno International Workshop on Security Issues in Coordination Models, Languages, and Systems tenutosi a Eindhoven, NETHERLANDS nel JUN 28-29, 2003) [10.1016/j.scico.2005.07.013].

Confining data and processes in global computing applications

GORLA, DANIELE;
2006

Abstract

A programming notation is introduced that can be used for protecting secrecy and integrity of data in global computing applications. The approach is based on the explicit annotations of data and network nodes. Data are tagged with information about the allowed movements, network nodes are tagged with information about the nodes that can send data and spawn processes to them. The annotations are used to confine movements of data and processes. The approach is illustrated by applying it to three paradigmatic calculi for global computing, namely CKLAIM (a calculus at the basis of CKLAIM), D pi (a distributed version of the pi-calculus) and Mobile Ambients Calculus. For all of these formalisms, it is shown that their semantics guarantees that computations proceed only while respecting confinement constraints. Namely, it is proven that, after successful static type checking, data can reside at and cross only authorised nodes. "Local" formulations of this property where only relevant subnets type check are also presented. Finally, the theory is tested by using it to model secure behaviours of a UNIX-like multiuser system. (c) 2006 Elsevier B.V. All rights reserved.
2006
data secrecy; formal methods; global computing; type systems
01 Pubblicazione su rivista::01a Articolo in rivista
Confining data and processes in global computing applications / Rocco De, Nicola; Gorla, Daniele; Rosario, Pugliese. - In: SCIENCE OF COMPUTER PROGRAMMING. - ISSN 0167-6423. - STAMPA. - 63:1(2006), pp. 57-87. (Intervento presentato al convegno International Workshop on Security Issues in Coordination Models, Languages, and Systems tenutosi a Eindhoven, NETHERLANDS nel JUN 28-29, 2003) [10.1016/j.scico.2005.07.013].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/144945
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 11
  • ???jsp.display-item.citation.isi??? 6
social impact