Computer Science ›› 2015, Vol. 42 ›› Issue (7): 178-181.doi: 10.11896/j.issn.1002-137X.2015.07.039

Previous Articles     Next Articles

Security Model for Distributed System Based on Seal Calculus

HUANG Yong WU Jin-zhao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To address the weaknesses of the current security model for distributed computation,this paper proposed a non-interference security model,which is described in the setting of Seal calculus.The new model reduces the characteri-zation of systems security to the location bisimulation equivalence of certain processes in which the position and mobility of systems have been taken into consideration.This paper also proved that the model can define a composite security property according to the security requirements of distributed systems.Finally,a case study was illuminated to show the practical application of this model.

Key words: Distributed system,Seal calculus,Location bisimulation,Security model

[1] Fernando N,Loke S W,Rahayu W.Mobile Cloud Computing:a Survey [J].Future Generation Computer Systems,2013,29(1):84-106
[2] Roman R,Zhou Jian-ying,Lopez J.On The Features and Challenges of Security and Privacy in Distributed Internet of Things [J].Computer Networks,2013,7(10):2266-2279
[3] Goguen J A,Meseguer J.Security Policies And Security Models[C]∥Proc.IEEE Symp.on Security and Privacy.1982:11-20
[4] Sutherland D.A Model of Information[C]∥Proc.NationalComputer Security Conf..1986:175-183
[5] Wittbold J T,Johnson D M.Information Flow in Nondetermi-nistic Systems[C]∥Proceedings of IEEE Symp.on Security and Privacy.IEEE Computer Society Press,1990:144-161
[6] Focardi R,Corrieri R.Classification of Security Properties(Part I:Information Flow)[J].Foundations of Security Analysis and Design-Tutorial Lectures,Springer-Verlag,volume 2171 of LNCS,2001:331-396
[7] Focardi R,Rossi S.Information Flow Security in Dynamic Contexts [J].Journal of Computer Security,2006,14 (1):65-110
[8] Oheimb D.Information Flow Control Revisited:Noninfluence=Noninterference+Nonleakage [C]∥Proceedings of European Symposium on Research in Computer Security 2004 (ESORICS’04).Springer-Verlag,Vol.LNCS 3193,2004:225-243
[9] Riely J,Matthew H.Distributed Processes and Location Failures[J].Theoretical Computer Science Archive,2001,266(122):693-735
[10] 王立斌,陈克非.可移动系统安全模型统一框架[J].电子学报,2002,30(12A):2108-2110 Wang Li-bin,Chen Ke-fei.A Uniform Framework of Security Model for Mobile Systems [J].Acta Electronica Sinica,2002,0(12A):2108-2110
[11] 余万涛,胡光锐.考虑位置失效的移动系统安全模型[J].计算机应用研究,2006,10:128-129 Yu Wan-tao,Hu Guang-rui.Security Model for Mobile Systems with Location Failures [J].Application Research of Computers,2006,0:128-129
[12] Castagnaa G,Vitekb J,Zappa Nardelli F.The Seal Calculus [J].Information and Computation,2005,201(1):1-54
[13] Davide Sangiorgi,David Walker.The Pi-Calculus:A Theory of Mobile Processes [M].Cambridge University Press,2002
[14] Cardelli L,Gordon A D.Mobile Ambients[J].Foundations ofSoftware Science and Computation Structures,LNCS,1998,1378:140-155
[15] Bugliesi M,Gallina L,Hamadou S,et al.Behavioral Equivalences and Interference Metrics for Mobile Ad-Hoc Networks [J].Performance Evaluation,2014,3:41-72

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!