Abstract
Aiming at the problem of access control in distributed computing security model, a secure Seal calculus based on hybrid type detection is proposed. In order to realize the security policy that low security level information in the multi-level security system can only flow to equal or higher security levels, it establishes a security system with security level for Seal calculus, and uses static type detection to realize fine particle size access control efficiently. To solve the practical problems of channel control and security power reduction, an effective dynamic transformation framework based on mandatory type transformation is proposed. The static detection and dynamic detection are organically integrated to form a unified security model, which can not only guarantee the security of distribute computing, but also have good availability.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wu, Z.-Z., Chen, X.-Y., Yang, Z., et al.: Survey on information flow control. J. Softw. 28(1), 135–159 (2017). (in Chinese)
Pasquier, T.F.J.M., Singh, J., Bacon, J.: Managing big data with information flow control. SIGARCH Comput. Archit. News 14(9), 721–731 (2014)
Bake, D.B.: Fortresses built upon sand. In: Proceedings of the New Security Paradigms Workshop, pp. 148–153 (1996)
Deng, Y., Sangiorgi, D.: Towards an algebraic theory of typed mobile processes. Theor. Comput. Sci. 350(2–3), 188–212 (2004)
Yoon, M.K., Chen, N.S.Y., Christodorescu, M.: PIFT: predictive information-flow tracking. In: Proceedings of the ASPLOS, pp. 246−253. ACM Press, Atlanta (2016)
Nardelli, F.Z.: Types for seal calculus. Master thesis (2000)
Braghin, C., Sharygina, N., Barone-Adesi, K.: Automated verification of security policies in mobile code. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 37–53. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73210-5_3
Hennessy, M., Riely, J.: Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Lang. Syst. 24(5), 566–590 (2002)
Guo, Y.-C., Fang, B.-X., Yin, L.-H., et al.: A security model for confidentiality and integrity in mobile computing. Chin. J. Comput. 36(7), 1424–1433 (2013). (in Chinese)
Li, Q., Yuan, Z.-X.: Permission type system for internal timing information flow in multi-thread programs. Comput. Sci. 41(3), 163–168 (2014). (in Chinese)
Acknowledgment
This work is supported by the Key project of science and technology research in Guangxi education (No. 2013ZD021), the innovation team project of of xiangsihu youth scholars of Guangxi University For Nationalities, the Application Research Program of 2016 the Guangxi province of China young and middle-aged teachers basic ability promotion project (No. KY2016YB133), the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB029), and the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB028).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Huang, Y., Li, Y., Jin, Q. (2018). Distributed Computing Security Model Based on Type System. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-2907-4_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2906-7
Online ISBN: 978-981-13-2907-4
eBook Packages: Computer ScienceComputer Science (R0)