2009
DOI: 10.1017/s0960129509007762
|View full text |Cite
|
Sign up to set email alerts
|

A type system for Discretionary Access Control

Abstract: ReceivedDiscretionary Access Control (DAC) systems provide powerful resource management mechanisms based on the selective distribution of capabilities to selected classes of principals. We study a type-based theory of DAC models for a process calculus that extends Cardelli, Ghelli and Gordon's pi-calculus with groups . In our theory, groups play the rôle of principals, the unit of abstraction for our access control policies, and types allow the specification of fine-grained access control policies to govern th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…For instance the work on the Dπ calculus has introduced sophisticated type systems for controlling the access to distributed resources [11,12]. Furthermore, discretionary access control has been considered in [4] which similarly to our work employs the π-calculus with groups, while role-based access control (RBAC) has been considered in [3,9,6]. In addition, authorization policies and their analysis via type checking has been considered in a number of papers including [10,1].…”
Section: Related Workmentioning
confidence: 99%
“…For instance the work on the Dπ calculus has introduced sophisticated type systems for controlling the access to distributed resources [11,12]. Furthermore, discretionary access control has been considered in [4] which similarly to our work employs the π-calculus with groups, while role-based access control (RBAC) has been considered in [3,9,6]. In addition, authorization policies and their analysis via type checking has been considered in a number of papers including [10,1].…”
Section: Related Workmentioning
confidence: 99%
“…For instance the work on the Dπ calculus has introduced sophisticated type systems for controlling the access to resources advertised at different locations [25,26,24]. Furthermore, discretionary access control has been considered in [8] which similarly to our work employs the π-calculus with groups, while role-based access control (RBAC) has been considered in [7,20,13]. In addition, authorization policies and their analysis via type checking has been considered in a number of papers including [22,2,6].…”
Section: Lemma 62 (Strengthening)mentioning
confidence: 99%
“…Types for Access Control: types have been extensively used to prove that programs or distributed processes comply with an underlying access control policy, see, e.g., [26], [27], [28], [29], [30]. In the realm of ARBAC, types have been studied by Braghin et al [31] and Jagadeesan et al [32].…”
Section: B Related Workmentioning
confidence: 99%