Secure communications processing for distributed languages

被引:11
作者
Abadi, M
Fournet, C
Gonthier, G
机构
来源
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 1999年
关键词
D O I
10.1109/SECPRI.1999.766719
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Communications processing is an important part of distributed language systems with facilities such as RPC (remote procedure call) and RMI (remote method invocation). For security, messages may require cryptographic operations in addition to ordinary marshaling. We investigate a method for wrapping communications processing around an entity with secure local communication, such as a single machine or a protected network. The wrapping extends security properties of local communication to distributed communication. We formulate and analyze the method within a process calculus.
引用
收藏
页码:74 / 88
页数:15
相关论文
共 33 条
[1]   Secure implementation of channel abstractions [J].
Abadi, M ;
Fournet, C ;
Gonthier, G .
THIRTEENTH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1998, :105-116
[2]   Secure Web tunneling [J].
Abadi, M ;
Birrell, A ;
Stata, R ;
Wobber, E .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :531-539
[3]  
ABADI M, 1998, P 25 INT C AUT LANG, P868
[4]  
ABADI M, 1999, INFORMATION COMPUTAT, V148
[5]  
ABADI M, UNPUB SECURE IMPLEME
[6]  
Alderton DL, 1997, MIL PSYCHOL, V9, P5, DOI 10.1207/s15327876mp0901_1
[7]  
ANDERSON R, 1993, 1 ACM C COMP COMM SE, P215
[8]  
BELLARE M, 1995, P 2M ANN ACM S THEOR
[9]   THE CHEMICAL ABSTRACT MACHINE [J].
BERRY, G ;
BOUDOL, G .
THEORETICAL COMPUTER SCIENCE, 1992, 96 (01) :217-248
[10]   Network objects [J].
Birrell, A ;
Nelson, G ;
Owicki, S ;
Wobber, E .
SOFTWARE-PRACTICE & EXPERIENCE, 1995, 25 :87-130