Evidence-based AuditJeff VaughanLimin Jia, Karl Mazurak, and Steve ZdancewicDepartment of Computer and Information ScienceUniversity of PennsylvaniaCSF/LICS Joint SessionJune 24, 2008Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/23Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/23Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/23Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/23Key Idea: Proofs attest to data integrity.{ , }{ , }{ , }Application DataResource ProofPrincipal2/23[Necula+ 98]Today’s TalkAnalyzing the local security of Aura applications.The Aura ProjectA programming language called AuraA propositional fragment, modeled here by Aura0An ML-like computation language [Jia+ 08]A security aware programming modelactive, potentially malicious principalsmutual distrust between applications and principalsemphasis on access control and auditAn implementation including complier and .Net-based runtime3/23The Aura ProjectA programming language called AuraA propositional fragment, modeled here by Aura0An ML-like computation language [Jia+ 08]A security aware programming modelactive, potentially malicious principalsmutual distrust between applications and ...
Voir