Evidence-based AuditJe VaughanLimin Jia, Karl Mazurak, and Steve ZdancewicDepartment of Computer and Information ScienceUniversity of PennsylvaniaIBM PL Day/NJPLSAugust 28, 2008Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/14Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/14Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/14Our Setting: Distributed Access ControlA p p l i c a t i o n D a t aR e s o u r c e P r o o fP r i n c i p a l1/14Our approach: Proofs attest to message validity.{ , }{ , }{ , }Application DataResource ProofPrincipal2/14[Necula+ 98]A programming language called AuraA propositional fragment: the evidenceAn ML-like computation languageA security aware programming modelActive, potentially malicious principalsMutual distrust between applications and principalsEmphasis on access control and auditAn implementationMechanized Coq proofsA prototype interpreter and .Net-based runtimeThe Aura ProjectKey IdeaAugmenting requests with logged evidence (proofs) enablesprincipled access control and meaningful audit in distributedsystems.3/14The Aura ProjectKey IdeaAugmenting requests with logged evidence (proofs) enablesprincipled access control and meaningful audit in distributedsystems.A programming language called AuraA ...
Voir