2013
DOI: 10.1007/978-3-642-41157-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Affine Refinement Types for Authentication and Authorization

Abstract: Abstract. Refinement type systems have proved very effective for security policy verification in distributed authorization systems. In earlier work [12], we have proposed an extension of existing refinement typing techniques to exploit sub-structural logics and affine typing in the analysis of resource aware authorization, with policies predicating over access counts, usage bounds and resource consumption. In the present paper, we show that the invariants that we enforced by means of ad-hoc typing mechanisms i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…While the problem of letting the payload of the key refer to the identifiers A and B can be solved quite easily, since the referred to identities are globally and publicly known, the problem of letting the payload of a key predicate over the key itself is more involved due to lexical scoping. We show how to devise an encoding to solve the problem of self-dependent key types, which is close in spirit to the session key treatment advocated in previous work [Bugliesi et al 2012]. …”
Section: Typing the Session Key Using Self-dependent Key Typesmentioning
confidence: 79%
“…While the problem of letting the payload of the key refer to the identifiers A and B can be solved quite easily, since the referred to identities are globally and publicly known, the problem of letting the payload of a key predicate over the key itself is more involved due to lexical scoping. We show how to devise an encoding to solve the problem of self-dependent key types, which is close in spirit to the session key treatment advocated in previous work [Bugliesi et al 2012]. …”
Section: Typing the Session Key Using Self-dependent Key Typesmentioning
confidence: 79%