|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Aura: A Programming Language with Authorization and Audit
If you have a question about this talk, please contact Mateja Jamnik.
Existing mechanisms for authorizing and auditing the flow of information in networked computer systems are insufficient to meet the security requirements of high-assurance software systems. Current best practices typically rely on operating-system provided file permissions for authorization and an ad-hoc combination of OS and network-level (e.g. firewall-level) logging to generate audit trails.
This talk will describe work on a security-oriented programming language called Aura that attempts to address this problem of auditable information flows in a more principled way. Aura supports a built-in notion of principal and its type system incorporates ideas from authorization logic and information-flow constraints. These features, together with the Aura run-time system, enforce strong information-flow policies while generating good audit trails. These audit trails record access-control decisions (such as uses of downgrading or declassification) that influence how information flows through the system. Aura’s programming model is intended to smoothly integrate information-flow and access control constraints with the cryptographic enforcement mechanisms necessary in a distributed computing environment.
This is joint work with Jeff Vaughan, Limin Jia, Karl Mazurak, Jianzhou Zhou, Joseph Schorr, and Luke Zarko.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsLogic and Semantics Seminar (Computer Laboratory) Cavendish Astrophysics Seminars Liberia's Independence Day Talk
Other talksThe colonial hajj from India and Malaya Transfer of passive immunity in lambs Social processing in response to autobiographical memories of rejection and inclusion in depression Captchas – the state of play Edge-Decompositions of Graphs Recurrence of planar graph limits