Why What How Conclusion
Security Policies as Membranes in Systems for Global Computing
Vladimiro Sassone
University of Sussex, UK
GC 2004: MyThS/MIKADO/DART Meeting
Venice 15.06.04 with D. Gorla, M. Hennessy
- V. Sassone
Security Polices as Membranes
Security Policies as Membranes in Systems for Global Computing - - PowerPoint PPT Presentation
Why What How Conclusion Security Policies as Membranes in Systems for Global Computing Vladimiro Sassone University of Sussex, UK GC 2004: MyThS/MIKADO/DART Meeting Venice 15.06.04 with D. Gorla, M. Hennessy V. Sassone Security Polices
Why What How Conclusion
University of Sussex, UK
Security Polices as Membranes
Why What How Conclusion
1
2
3
4
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
1
2
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
1
2
3
Security Polices as Membranes
Why What How Conclusion
Tl.P
Security Polices as Membranes
Why What How Conclusion
Tl.P
Tl.P is an agent willing to migrate on l, whose body is P and
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
Tl.P|Q ]
Security Polices as Membranes
Why What How Conclusion
Tl.P|Q ]
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes
Why What How Conclusion
Tl.P|Q ]
T P
T P is
t(k) = good then (T enforces M′ p ) else ⊢ P : M′ p
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
T ′l.P : T
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
T ′l.P : T ∪ {l}
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Tl.P) can be represented as
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Tl.P) can be represented as
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
1
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
1
2
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
1
2
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Tl.P|Q ]
T P ≻ M′′
T P ≻ M′′:
p (by examining its PCC T or its
p, it decrease M′ p with the privileges granted to P.
p
Security Polices as Membranes
Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions
Security Polices as Membranes
Why What How Conclusion
Security Polices as Membranes