Abstract
In this paper, we present a new security model for distributed active objects. This model emphasizes the aspects of decentralisation and private data of objects. We consider principals as active objects thereby amalgamating subjects and objects into one concept providing a simple uniform security model based on visibility of objects and object local security specification of method accessibility. Decentralized security policies are possible in which every principal has some data that is inaccessible to others. We introduce this new security model algebraically as a semi-lattice contrasting it to the foundations of lattice-based security models similar to Denning’s work. As a proof of concept we show how the model can be naturally interpreted for a calculus of active objects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Cardelli, L.: A Theory of Objects. Springer, New York (1996)
Agha, G., Mason, I.A., Smith, S.F., Talcott, C.L.: Towards a Theory of Actor Computation (Extended Abstract). In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol. 630, pp. 565–579. Springer, Heidelberg (1992)
Alpízar, R., Smith, G.: Secure Information Flow for Distributed Systems. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 126–140. Springer, Heidelberg (2010)
Anderson, R.: Security Engineering – A Guide to Building Dependable Distributed Systems. Wiley (2001)
Attali, I., Caromel, D., Henrio, L., Aguila, F.L.D.: Secured information flow for asynchronous sequential processes. ENTCS 180(1), 17–34 (2007)
Banerjee, A., Naumann, D.A.: Stack-based access control for secure information flow. Journal of Functional Programming 15(2) (2003)
Caromel, D., Delbé, C., di Costanzo, A., Leyton, M.: ProActive: an integrated platform for programming and running applications on grids and P2P systems. Computational Methods in Science and Technology 12(1), 69–77 (2006)
Caromel, D., Henrio, L., Serpette, B.P.: Asynchronous and deterministic objects. In: Principles of Programming Languages, POPL 2004. ACM Press (2004)
Davey, B.A., Priestley, H.A.: Introduction to Lattices and Order, 2nd edn. Cambridge University Press (2002)
Denning, D.E.: Lattice model of secure information flow. Communications of the ACM 19(5), 236–242 (1976)
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7) (1977)
Fenton, J.S.: Information protection systems. PhD thesis, Univ. Cambridge (1973)
Fleck, A., Kammüller, F.: A security model for functional active objects with an implementation in erlang. In: Computational Informatics, Blue Herons (2011)
Halstead Jr., R.H.: Multilisp: A language for concurrent symbolic computation. ACM Transactions on Programming Languages and Systems 7(4), 501–538 (1985)
Henrio, L., Kammüller, F., Lutz, B.: Aspfun: A typed functional active object calculus. Science of Computer Programming 77(7-8), 823–847 (2012)
Hutter, D., Mantel, H., Schaefer, I., Schairer, A.: Security of multi-agent systems: A case study on comparison shopping. J. Applied Logic 5(2), 303–332 (2007)
Kammüller, F.: Using functional active objects to enforce privacy. In: 5th Conf. on Network Architectures and Information Systems Security, SAR-SSI 2010 (2010)
Kammüller, F.: Privacy Enforcement and Analysis for Functional Active Objects. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 93–107. Springer, Heidelberg (2011)
Kammüller, F.: Information Flow Control for Functional Active Objects (May 2012), http://user.cs.tu-berlin.de/~flokam/proofs.pdf
Kogan, B., Jajodia, S.: An audit model for object-oriented databases. In: 7th Annual Computer Security Applications Conf., ACSAC 1991, pp. 90–99 (1991)
Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security 11, 2003 (2002)
Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: SOSP 1997. ACM (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kammüller, F. (2013). A Semi-lattice Model for Multi-lateral Security. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-35890-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35889-0
Online ISBN: 978-3-642-35890-6
eBook Packages: Computer ScienceComputer Science (R0)