Highly-structured software for network systems and its protection
dc.contributor.author | Mizuno, Masaaki | |
dc.contributor.department | Department of Computer Science | |
dc.date | 2018-08-23T07:07:07.000 | |
dc.date.accessioned | 2020-06-30T07:15:07Z | |
dc.date.available | 2020-06-30T07:15:07Z | |
dc.date.copyright | Thu Jan 01 00:00:00 UTC 1987 | |
dc.date.issued | 1987 | |
dc.description.abstract | <p>"Resource modules" are proposed as a useful tool for the design of software for network applications. A resource module encapsulates data and operations (called exported procedures) on the data and consists of protection, synchronization and access components. A collection of such modules working together constitutes a network computation. Handling resource sharing and concurrency effectively is a major goal of the resource module approach;Efficient sharing of resources requires both an access control policy and an information flow policy. The protection component of a resource modules is responsible for implementing these policies. A modified access control list, which realizes the principle of least privilege as provided by capabilities, combined with access-rights expressions provides a powerful access control mechanism;An information flow mechanism which is a combination of compile-time and run-time approaches is developed to implement an information flow policy. A compile-time algorithm establishes the internal information flow security of an individual exported procedure independently of other resource modules. It also creates a special data structure for efficient run-time certification. A run-time mechanism completes the certification of the entire program at message passing time by verifying every information flow caused by procedure invocations. An extension of the certification mechanism is also developed in order to eliminate the run-time overhead. This mechanism uses information generated by the compile-time algorithm and certifies, at link time, all possible information flows which would be caused by execution of the program.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/rtd/11710/ | |
dc.identifier.articleid | 12709 | |
dc.identifier.contextkey | 6458437 | |
dc.identifier.doi | https://doi.org/10.31274/rtd-180813-10644 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | rtd/11710 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/64998 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/rtd/11710/r_8721912.pdf|||Fri Jan 14 18:56:44 UTC 2022 | |
dc.subject.disciplines | Computer Sciences | |
dc.subject.keywords | Computer science | |
dc.title | Highly-structured software for network systems and its protection | |
dc.type | dissertation | en_US |
dc.type.genre | dissertation | en_US |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | f7be4eb9-d1d0-4081-859b-b15cee251456 | |
thesis.degree.level | dissertation | |
thesis.degree.name | Doctor of Philosophy |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- r_8721912.pdf
- Size:
- 3.47 MB
- Format:
- Adobe Portable Document Format
- Description: