De Nicola, Rocco and Gorla, Daniele and Pugliese, Rosario Confining data and processes in global computing applications. Science of Computer Programming, 63 (1). pp. 57-87. ISSN 0167-6423 (2006)Full text not available from this repository.
A programming notation is introduced that can be used for protecting secrecy and integrity of data in global computing applications. The approach is based on the explicit annotations of data and network nodes. Data are tagged with information about the allowed movements, network nodes are tagged with information about the nodes that can send data and spawn processes to them. The annotations are used to confine movements of data and processes. The approach is illustrated by applying it to three paradigmatic calculi for global computing, namely cKlaim (a calculus at the basis of cKlaim), (a distributed version of the [pi]-calculus) and Mobile Ambients Calculus. For all of these formalisms, it is shown that their semantics guarantees that computations proceed only while respecting confinement constraints. Namely, it is proven that, after successful static type checking, data can reside at and cross only authorised nodes. "Local" formulations of this property where only relevant subnets type check are also presented. Finally, the theory is tested by using it to model secure behaviours of a UNIX-like multiuser system.
|Funders:||This work has been partially supported by EU within FET — Global Computing initiative, projects MIKADO IST-2001-32222 and AGILE IST-2001-32747. The funding body is not responsible for any use that might be made of the results presented here.|
|Uncontrolled Keywords:||Global computing; Formal methods; Type systems; Data secrecy|
|Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Research Area:||Computer Science and Applications|
|Depositing User:||Rocco De Nicola|
|Date Deposited:||24 May 2011 10:15|
|Last Modified:||11 Jul 2011 14:36|
Actions (login required)