skip to main content
10.1145/1272996.1273033acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
Article

Authorizing applications in singularity

Published: 21 March 2007 Publication History

Abstract

We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access control lists are patterns that recognize principals. We present a security model that embodies this design in an experimental operating system, and we describe the implementation of our design and its performance in the context of this operating system.

References

[1]
M. Abadi, A. Birrell, and T. Wobber. Access Control in a World of Software Diversity. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X), Santa Fe, NM, pp. 127--132, June 2005.
[2]
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15(4): 706--734, September 1993.
[3]
M. Aiken, M. Fähndrich, C. Hawblitzel, G. Hunt, J. Larus. Deconstructing Process Isolation. In Proceedings of the 2006 Workshop on Memory System Performance and Correctness, San Jose, CA, pp. 1--10, October 2006.
[4]
J. Anderson. Computer Security Technology Planning Study Volume II. ESD-TR-73-51. Air Force Systems Command, Oct. 1972.
[5]
R. Anderson. Security Engineering. John Wiley & Sons, Chapter 4: Access Control, pp. 58--59. 2001 (also http://www.cl.cam.ac.uk/~rjal4/book.html).
[6]
L. Badger. A Domain and Type Enforcement UNIX Prototype. USENIX Comp. Sys., 9(1): 47--83, Winter 1996.
[7]
L. Bauer, S. Garriss, M. Reiter. Distributed Proving in Access-Control Systems. In Proceedings of IEEE Symposium on Security and Privacy, pp. 81--85, May 2005.
[8]
A. Birrell, A. Hisgen, C. Jerian, T. Mann, and G. Swart. The Echo Distributed File System. DEC SRC Technical Report 111. October 1993.
[9]
D. Box. Essential .NET, Volume 1: The Common Language Runtime. Addison-Wesley Professional (2002).
[10]
K. Brown. Programming Windows Security. Addison-Wesley Professional (2000).
[11]
ECMA International. C# Language Specification. ECMA Standard ECMA-334. June 2006. http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-334.pdf.
[12]
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Computer, 36(7): 55--62, 2003.
[13]
M. Fähndrich, M. Aiken, C. Hawblitzel, O. Hodson, G. Hunt, J. Larus, and S. Levi. Language Support for Fast and Reliable Message-based Communication in Singularity OS. In Proceedings of EuroSys 2006, Leuven, Belgium, pp. 177--190, April 2006.
[14]
D. Ferraiolo and D. Kuhn, Role-Based Access Control, In Proceedings of the 15th National Computer Security Conference, pp. 554--563, 1992.
[15]
B. Fried, A. Lowry, and M. Stanley. "BigDog: Hierarchical Authentication, Session Control, and Authorization for the Web". USENIX Second Workshop on Electronic Commerce, Nov. 1996.
[16]
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital Distributed System Security Architecture. In Proceedings of the National Computer Security Conference, pp. 305--319, 1989
[17]
L. Gong, G. Ellison, M. Dageforde. Inside Java 2 Platform Security, Second Edition. Addison-Wesley (May 2003).
[18]
G. Hunt, M. Aiken, P. Barham, M. Fähndrich, C. Hawblitzel, O. Hodson, J. Larus, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. Sealing OS Processes to Improve Dependability and Security. To appear, EuroSys'07, Lisboa, Portugal.
[19]
G. Hunt, J. Larus, M. Abadi, M. Aiken, P. Barham, M. Fähndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. Zill. An Overview of the Singularity Project. Microsoft Research Technical Report MSR-TR-2005-135.
[20]
M. Kaminsky, G. Savvides, D. Mazières, and F. Kaashoek. Decentralized User Authentication in a Global File System. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03), Bolton Landing, NY, pp. 60--73, October 2003.
[21]
B. Lampson. Designing a global name service. In Proceedings of the 5th ACM Symposium on Principals of Distributed Computing, pp. 1--10, 1986.
[22]
B. Lampson, M. Abadi, M. Burrows and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comp. Sys., 10(4):265--310, Nov. 1992
[23]
B. Lampson. Protection. ACM Operating Systems Review, 8(1): 18--24, January 1974.
[24]
Microsoft Corporation. Assembly Manifest. .NET Framework Development Guide. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cpguide/html/cpconAssemblyManifest.asp.
[25]
Microsoft Corporation. Client Impersonation. Win32 and COM Development. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/client_impersonation.asp.
[26]
Microsoft Corporation. Strong Named Assemblies. .NET Framework Development Guide. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cpguide/html/cpconStrong-NamedAssemblies.asp.
[27]
E. Shi, A. Perrig and L. Van Doorn. BIND: A Fine-grained Attestation Service for Secure Distributed Systems. In Proceedings of IEEE Symposium on Security and Privacy, pp. 154--168, May 2005.
[28]
A. Shieh, D. Williams, E. Sirer, F. Schnieder. Nexus: A New Operating System for Trustworthy Computing. Work in progress session - SOSP 2005, Brighton, UK, October 2005, http://doi.acm.org/10.1145/1095810.1118613.
[29]
M. Swift, J. Trostle, J. Brezak, and B. Gossman. Improving the Granularity of Access Control for Windows 2000. ACM Trans. Info. and Sys. Security, 5(4): 398--437, Nov. 2002.
[30]
The Open Group. DCE 1.1: Authentication and Security. Catalog number C311, August 1997. http://www.opengroup.org/pubs/catalog/c311.htm.
[31]
Trusted Computing Group. Trusted Platform Module (TPM) Specifications. https://www.trustedcomputinggroup.org/specs/TPM.
[32]
D. Wallach, A. Appel, and E. Felten. "SAFKASI: A Security Mechanism for Language-based Systems". ACM Trans. Soft. Eng. and Meth., 9(4): 341--378, Oct. 2000.
[33]
E. Wobber, M. Abadi, M. Burrows and B. Lampson. Authentication in the Taos Operating System. ACM Trans.Comp.Sys., 12(1): 3--32, Feb. 1994.

Cited By

View all

Index Terms

  1. Authorizing applications in singularity

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
    March 2007
    431 pages
    ISBN:9781595936363
    DOI:10.1145/1272996
    • cover image ACM SIGOPS Operating Systems Review
      ACM SIGOPS Operating Systems Review  Volume 41, Issue 3
      EuroSys'07 Conference Proceedings
      June 2007
      386 pages
      ISSN:0163-5980
      DOI:10.1145/1272998
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 March 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. application identity
    3. capabilities
    4. channels
    5. delegation
    6. pattern matching
    7. regular expressions

    Qualifiers

    • Article

    Conference

    EuroSys07
    Sponsor:
    EuroSys07: Eurosys 2007 Conference
    March 21 - 23, 2007
    Lisbon, Portugal

    Acceptance Rates

    Overall Acceptance Rate 241 of 1,308 submissions, 18%

    Upcoming Conference

    EuroSys '25
    Twentieth European Conference on Computer Systems
    March 30 - April 3, 2025
    Rotterdam , Netherlands

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media