Refinement type systems have proved very effective for security policy verification in distributed authorization systems. In earlier work , we have proposed an extension of existing refinement typing techniques to exploit sub-structural logics and affine typing in the analy- sis of resource aware authorization, with policies predicating over access counts, usage bounds and resource consumption. In the present paper, we show that the invariants that we enforced by means of ad-hoc typing mechanisms in our initial proposal can be internalized, and expressed directly as proof obligations for the underlying ane logical system. The new characterization leads to a more general, modular design of the system, and is effective in the analysis of interesting classes of authentication protocols and authorization systems.
|Data di pubblicazione:||2013|
|Titolo:||Affine Refinement Types for Authentication and Authorization|
|Titolo del libro:||7th International Symposium on Trustworthy Global Computing|
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1007/978-3-642-41157-1_2|
|Appare nelle tipologie:||4.1 Articolo in Atti di convegno|
File in questo prodotto:
|chp:10.1007/978-3-642-41157-1_2.pdf||Versione dell'editore||Accesso chiuso-personale||Riservato|