Abstract
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies and security protocols over distributed, mobile infrastructures, and aims to stand to ambients as the spi calculus stands to π. We present a type system that separates trusted and untrusted data and code, while allowing safe interactions with untrusted sites. We prove that the type system enforces a privacy property, and show the expressiveness of the calculus via examples and an encoding of the spicalculus.
Research supported by EU FET-GC ‘MyThS: Models and Types for Security in Mobile Distributed Systems’ IST-2001-32617 and ‘Mikado: Mobile Calculi based on Domains’ IST-2001-32222, and by MIUR Project ‘Modelli Formali per la Sicurezza’.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi. Protection in programming-language translations. In Proceedings of ICALP’98, number 1443 in LNCS, pages 868–883. Springer-Verlag, 1998.
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In Proceedings of POPL’02, pages 33–44. ACM Press, 2002.
M. Abadi and A. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1–70, 1999.
M. Bugliesi and G. Castagna. Secure safe ambients. In Procedings of POPL’01, pages 222–235. ACM Press, 2001.
M. Bugliesi, G. Castagna, and S. Crafa. Boxed ambients. In Proceedings of TACS’01, number 2215 in LNCS, pages 38–63. Springer-Verlag, 2001.
M. Bugliesi, G. Castagna, and S. Crafa. Reasoning about security in mobile ambients. In Proceedings of CONCUR 2001, number 2154 in LNCS, pages 102–120. Springer-Verlag, 2001.
M. Bugliesi, S. Crafa, M. Merro, and V. Sassone. Communication interference in mobile boxed ambients. In FST&TCS 2002, volume 2556 of LNCS, pages 71–84. Springer-Verlag, 2002.
L. Cardelli. Abstractions for mobile computations. In Secure Internet Programming, number 1603 in LNCS, pages 51–94. Springer-Verlag, 1999.
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. In Proceedings of CONCUR’00, number 1877 in LNCS, pages 365–379. Springer-Verlag, August 2000.
L. Cardelli and A. Gordon. Mobile ambients. In FoSSaCS’98, number 1378 in LNCS, pages 140–155. Springer-Verlag, 1998.
S. Crafa, M. Bugliesi, and G. Castagna. Information Flow Security for Boxed Ambients. ENTCS, 66(3), 2002.
R. De Nicola, G. Ferrari, and R. Pugliese. Klaim: a kernel language for agents interaction and mobility. IEEE Transactions on Software Engeneering, 24:315–330, 1998.
C. Fournet, J-J. Levy, and Schmitt. A. An asynchronous, distributed implementation of mobile ambients. In Proceedings of IFIP TCS’00, number 1872 in LNCS. Springer-Verlag, 2000.
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. In Proceedings of CSFW 2001, pages 145–159. IEEE Computer Society, 2001.
M. Hennesy and J. Riely. Type-safe execution of mobile agents in anonymous networks. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number 1603 in LNCS, pages 95–115. Springer-Verlag, 1999.
F. Levi and D. Sangiorgi. Controlling interference in ambients. In Proceedings of POPL’00, pages 352–364. ACM Press, 2000.
R. Milner, J. Parrow, and D. Walker. A Calculus of Mobile Processes, Parts I and II. Information and Computation, 100:1–77, September 1992.
T. Sander and C. Tschudin. Towards mobile cryptography. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1998.
D. Sangiorgi and A. Valente. A distributed abstract machine for safe ambients. In Proc. of ICALP 2001, pages 408–420, 2001.
U. G. Wilhelm, L. Buttyàn, and S. Staamann. On the problem oftrust in mobile agent systems. In Symposium on Network and Distributed System Security. Internet Society, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bugliesi, M., Crafa, S., Prelic, A., Sassone, V. (2003). Secrecy in Untrusted Networks. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds) Automata, Languages and Programming. ICALP 2003. Lecture Notes in Computer Science, vol 2719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45061-0_75
Download citation
DOI: https://doi.org/10.1007/3-540-45061-0_75
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40493-4
Online ISBN: 978-3-540-45061-0
eBook Packages: Springer Book Archive