2006
DOI: 10.1007/11863908_8
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Model of Access Control for Mobile Interactive Devices

Abstract: Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java MIDP security architecture used in Java-enabled mobile telephones. We consider access control permissions with multiplicities in order to allow to use a permission a certain number of times. An operational semantics of the model and a formal definition of what it means for a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2008
2008
2009
2009

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(21 citation statements)
references
References 16 publications
0
21
0
Order By: Relevance
“…One of the main objectives of the work that is being reported here, has been to build a framework which would provide a formal setting to define the permission models defined by MIDP and the one presented in [2] (and variants of it) in an uniform way and to perform a formal analysis and comparison of those models. This framework, which is formally defined using the Calculus of Inductive Constructions [4,5], adopts, with variations, most of the security and programming constructions defined in [2].…”
Section: An Alternative Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…One of the main objectives of the work that is being reported here, has been to build a framework which would provide a formal setting to define the permission models defined by MIDP and the one presented in [2] (and variants of it) in an uniform way and to perform a formal analysis and comparison of those models. This framework, which is formally defined using the Calculus of Inductive Constructions [4,5], adopts, with variations, most of the security and programming constructions defined in [2].…”
Section: An Alternative Modelmentioning
confidence: 99%
“…This framework, which is formally defined using the Calculus of Inductive Constructions [4,5], adopts, with variations, most of the security and programming constructions defined in [2]. In particular it has been modified so as to be parameterized by permission granting policies, while in the original work this relation is fixed.…”
Section: An Alternative Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Resource security may be assured either by runtime checks, or a type system for resource accounting, such that any well-typed program will only attempt to use resources for which it already has authorisation. We have also used abstract interpretation to model such external resources [10]. From a program control-flow graph, we infer constraints in a lattice of permissions: whenever some resourceful action takes place, the program must have acquired at least the permissions required.…”
Section: Em Ory Usagementioning
confidence: 99%