Secure implementation of channel abstractions

被引:39
作者
Abadi, M [1 ]
Fournet, C
Gonthier, G
机构
[1] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
[2] Microsoft Corp, Res, Redmond, WA 98052 USA
[3] INRIA, Rocquencourt, France
[4] Compaq, Syst Res Ctr, Palo Alto, CA USA
[5] Lucent Technol, Bell Labs, Res, Holmdel, NJ USA
关键词
D O I
10.1006/inco.2002.3086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Communication in distributed systems often relies on useful abstractions such as channels, remote procedure calls, and remote method invocations. The implementations of these abstractions sometimes provide security properties, in particular through encryption. In this paper we study those security properties, focusing on channel abstractions. We introduce a simple high-level language that includes constructs for creating and using secure channels. The language is a variant of the join-calculus and belongs to the same family as the pi-calculus. We show how to translate the high-level language into a lower-level language that includes cryptographic primitives. In this translation, we map communication on secure channels to encrypted communication on public channels. We obtain a correctness theorem for our translation; this theorem implies that one can reason about programs in the high-level language without mentioning the subtle cryptographic protocols used in their lower-level implementation. (C) 2002 Elsevier Science (USA).
引用
收藏
页码:37 / 83
页数:47
相关论文
共 44 条
[1]   Secure communications processing for distributed languages [J].
Abadi, M ;
Fournet, C ;
Gonthier, G .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :74-88
[2]   Secure implementation of channel abstractions [J].
Abadi, M ;
Fournet, C ;
Gonthier, G .
THIRTEENTH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1998, :105-116
[3]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[4]   Secure Web tunneling [J].
Abadi, M ;
Birrell, A ;
Stata, R ;
Wobber, E .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :531-539
[5]  
Abadi M, 1998, LECT NOTES COMPUT SC, V1443, P868, DOI 10.1007/BFb0055109
[6]  
ABADI M, 1999, LECT NOTES COMPUTER, V1738, P122
[7]  
ABADI M, UNPUB SECURE IMPLEME
[8]  
ABADI M, 2000, P 27 ACM S PRINC PRO, P302
[9]  
Alderton DL, 1997, MIL PSYCHOL, V9, P5, DOI 10.1207/s15327876mp0901_1
[10]   THE CHEMICAL ABSTRACT MACHINE [J].
BERRY, G ;
BOUDOL, G .
THEORETICAL COMPUTER SCIENCE, 1992, 96 (01) :217-248