Skip to main content

Distributed Computing Security Model Based on Type System

  • Conference paper
  • First Online:
  • 358 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 950))

Abstract

Aiming at the problem of access control in distributed computing security model, a secure Seal calculus based on hybrid type detection is proposed. In order to realize the security policy that low security level information in the multi-level security system can only flow to equal or higher security levels, it establishes a security system with security level for Seal calculus, and uses static type detection to realize fine particle size access control efficiently. To solve the practical problems of channel control and security power reduction, an effective dynamic transformation framework based on mandatory type transformation is proposed. The static detection and dynamic detection are organically integrated to form a unified security model, which can not only guarantee the security of distribute computing, but also have good availability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wu, Z.-Z., Chen, X.-Y., Yang, Z., et al.: Survey on information flow control. J. Softw. 28(1), 135–159 (2017). (in Chinese)

    MathSciNet  Google Scholar 

  2. Pasquier, T.F.J.M., Singh, J., Bacon, J.: Managing big data with information flow control. SIGARCH Comput. Archit. News 14(9), 721–731 (2014)

    Google Scholar 

  3. Bake, D.B.: Fortresses built upon sand. In: Proceedings of the New Security Paradigms Workshop, pp. 148–153 (1996)

    Google Scholar 

  4. Deng, Y., Sangiorgi, D.: Towards an algebraic theory of typed mobile processes. Theor. Comput. Sci. 350(2–3), 188–212 (2004)

    MATH  Google Scholar 

  5. Yoon, M.K., Chen, N.S.Y., Christodorescu, M.: PIFT: predictive information-flow tracking. In: Proceedings of the ASPLOS, pp. 246−253. ACM Press, Atlanta (2016)

    Article  Google Scholar 

  6. Nardelli, F.Z.: Types for seal calculus. Master thesis (2000)

    Google Scholar 

  7. Braghin, C., Sharygina, N., Barone-Adesi, K.: Automated verification of security policies in mobile code. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 37–53. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73210-5_3

    Chapter  Google Scholar 

  8. Hennessy, M., Riely, J.: Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Lang. Syst. 24(5), 566–590 (2002)

    Article  Google Scholar 

  9. Guo, Y.-C., Fang, B.-X., Yin, L.-H., et al.: A security model for confidentiality and integrity in mobile computing. Chin. J. Comput. 36(7), 1424–1433 (2013). (in Chinese)

    Article  Google Scholar 

  10. Li, Q., Yuan, Z.-X.: Permission type system for internal timing information flow in multi-thread programs. Comput. Sci. 41(3), 163–168 (2014). (in Chinese)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the Key project of science and technology research in Guangxi education (No. 2013ZD021), the innovation team project of of xiangsihu youth scholars of Guangxi University For Nationalities, the Application Research Program of 2016 the Guangxi province of China young and middle-aged teachers basic ability promotion project (No. KY2016YB133), the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB029), and the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB028).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongsheng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Y., Li, Y., Jin, Q. (2018). Distributed Computing Security Model Based on Type System. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics