Distributed Computing Security Model Based on Type System

  • Yong Huang
  • Yongsheng LiEmail author
  • Qinggeng Jin
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 950)


Aiming at the problem of access control in distributed computing security model, a secure Seal calculus based on hybrid type detection is proposed. In order to realize the security policy that low security level information in the multi-level security system can only flow to equal or higher security levels, it establishes a security system with security level for Seal calculus, and uses static type detection to realize fine particle size access control efficiently. To solve the practical problems of channel control and security power reduction, an effective dynamic transformation framework based on mandatory type transformation is proposed. The static detection and dynamic detection are organically integrated to form a unified security model, which can not only guarantee the security of distribute computing, but also have good availability.


Distributed computing Seal calculus Type system 



This work is supported by the Key project of science and technology research in Guangxi education (No. 2013ZD021), the innovation team project of of xiangsihu youth scholars of Guangxi University For Nationalities, the Application Research Program of 2016 the Guangxi province of China young and middle-aged teachers basic ability promotion project (No. KY2016YB133), the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB029), and the Research Program of 2014 Guagnxi University for Nationalities of China (No. 2014MDYB028).


  1. 1.
    Wu, Z.-Z., Chen, X.-Y., Yang, Z., et al.: Survey on information flow control. J. Softw. 28(1), 135–159 (2017). (in Chinese)MathSciNetGoogle Scholar
  2. 2.
    Pasquier, T.F.J.M., Singh, J., Bacon, J.: Managing big data with information flow control. SIGARCH Comput. Archit. News 14(9), 721–731 (2014)Google Scholar
  3. 3.
    Bake, D.B.: Fortresses built upon sand. In: Proceedings of the New Security Paradigms Workshop, pp. 148–153 (1996)Google Scholar
  4. 4.
    Deng, Y., Sangiorgi, D.: Towards an algebraic theory of typed mobile processes. Theor. Comput. Sci. 350(2–3), 188–212 (2004)zbMATHGoogle Scholar
  5. 5.
    Yoon, M.K., Chen, N.S.Y., Christodorescu, M.: PIFT: predictive information-flow tracking. In: Proceedings of the ASPLOS, pp. 246−253. ACM Press, Atlanta (2016)CrossRefGoogle Scholar
  6. 6.
    Nardelli, F.Z.: Types for seal calculus. Master thesis (2000)Google Scholar
  7. 7.
    Braghin, C., Sharygina, N., Barone-Adesi, K.: Automated verification of security policies in mobile code. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 37–53. Springer, Heidelberg (2007). Scholar
  8. 8.
    Hennessy, M., Riely, J.: Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Lang. Syst. 24(5), 566–590 (2002)CrossRefGoogle Scholar
  9. 9.
    Guo, Y.-C., Fang, B.-X., Yin, L.-H., et al.: A security model for confidentiality and integrity in mobile computing. Chin. J. Comput. 36(7), 1424–1433 (2013). (in Chinese)CrossRefGoogle Scholar
  10. 10.
    Li, Q., Yuan, Z.-X.: Permission type system for internal timing information flow in multi-thread programs. Comput. Sci. 41(3), 163–168 (2014). (in Chinese)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.College of Software and Information SecurityGuangxi University for NationalitiesNanningChina
  2. 2.College of Information Science and EngineeringGuangxi University for NationalitiesNanningChina

Personalised recommendations