首页> 外文会议>International Workshop on Formal Aspects in Security and Trust >Type-Based Distributed Access Control vs. Untyped Attackers
【24h】

Type-Based Distributed Access Control vs. Untyped Attackers

机译:基于类型的分布式访问控制与非型攻击者

获取原文

摘要

This paper considers what happens when a system erroneously places trust in an attacker. More precisely we consider untyped attackers inside a distributed system in which security is enforced by the type system. Our Key-Based Decentralised Label Model for distributed access control combines a weak form of information flow control with cryptographic type casts. We extend our model to allow inside attackers by using three sets of type rules. The first set is for honest principals. The second set is for attackers; these rules require that only communication channels can be used to communicate and express our correctness conditions. The third set of type rules are used to type processes that have become corrupted by the attackers. We show that the untyped attackers can leak their own data and disrupt the communication of any principals that place direct trust in an attacker, but no matter what the attackers try, they cannot obtain data that does not include at least one attacker in its access control policy.
机译:本文认为,当一个系统错误地放置在攻击者的信任会发生什么。更确切地说,我们考虑一个分布式系统,其安全性是通过类型系统内部强制执行无类型的攻击。对于分布式访问控制我们的基于密钥的分散式标签模型结合了加密类型转换的信息流控制的弱势形态。我们扩展我们的模型采用三套类型规则允许内攻击。第一组是诚实的校长。第二组是攻击者;这些规则要求,只有通信渠道可以用来沟通和表达我们的正确性条件。第三组类型规则用于键入已经成为由攻击者破坏过程。我们表明,无类型攻击者可能会泄漏自己的数据和破坏任何主体的通信那个地方直接信任的攻击者,但不管是什么攻击尝试,他们无法获得不包括至少一个攻击者在其访问控制数据政策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号