R K Shyamasundar is
a Fellow of IEEE, a Fellow of ACM, Distinguished ACM Speaker,
a Distingusihed Alumnus of Indian Institute of Science, served
as IEEE Distinguished Speaker, is currently JC Bose National
Fellow, Distinguished V. Professor at the Department of Computer
Science, IIT Bombay where he is the principla investigator
of the Information Security Research and Development Centre
(ISRDC) from Ministry of Electronics and Information Technology
(MeiTY) from the Govt. of India. He was awarded the 2014 SN
Mitra award for excellence in research by the Indian National
Academy of Engineering. Since 2015, he is also the
Scholar-in-Residence at IIT Jodhpur. He is the founding Dean
of the School of Technology and Computer Science at TIFR.
He has made outstanding contributions to Real-Time Distributed
Computing, Logics of Programs, Network and Computer Security.
His research interests include distributed real-time systems,
Logics
of Programs, Concurrent and Parallel programming Languages,
Formal Methods, Cyber Security etc. He has more than 300 publications,
8 books, 8 international patents, 3 Indian patents, and 3
Best Paper Awards. Thirty five students have completed Ph.D.
under his guidance, has served on IEEE Esterel Standards and
served as consultant to ESPRIT projects. He did post doctoral
work under the legendary Turing Laureate Professor Dr. Edsgar
W. Dijkstra and was a Distinguished Visiting fellow under
the UK Royal Academy of Engineering at the Computing Laboratory
of University of Cambridge. He has also served as a Distinguished
Visiting Fellow by the UK Royal Academy of Engineering in
2016 at the City University of London. He has served as Faculty/Staff
at IBM TJ Research, Eindhoven University, State University
of Utrecht, Pennsylvania State University, University of Illinois,
University of California at San Diego at Lajolla, University
of Cambridge, University of Linkoping, SUNU at Albany, UNM
at Albuquerque, IRISA, INRIA, CWI, JAIST Japan, Max Planck
Institute , IBM
Research India etc.
He was Founding Chair of conference series Foundations of
Software Technology and Theoretical Computer Science (FSTTCS),
founding President of Indian Association of Research in Computing
Science (IARCS.), founding Dean of School of Technology and
Computer Science and Founder of the Center for Formal Designa
and verification of Software as a tri-partite center among
BARC, TIFR and IIT Bombay) located at IIT Bombay.
He serves/served on the Governing Council of IIIT Allahabad,
IIIT Jabalpur, CSIR Centre CMMACS (CSIR-FPI) Bangalore , serves
on the Technical Advisory Board of BSE (Bombay Stock Exchange),
and Research Advisory Board for Institute of Development and
Research in Banking Technology (IDRBT) of RBI at Hyderabad.
He is a Fellow of Indian Academy of Sciences, Indian National
Science Academy, National Academy of Sciences, National Academy
of Engineering, India and a Fellow of the Academy of Sciences
of the Developing world (TWAS), Trieste, Italy.
He has served on IEEE Esterel Standards Committee and serves
on the Editorial board of Journal of Parallel and Distributed
Computing, corersponding editor for Sadhana- Journal of Engineering
Sciences of the Indian Academy of Sciences etc. He is a receipient
of Diamond Jubilee medal from IETE and also its’ Fellow.
|
Title: Security Models
as a Foundation for Building End-to-End Secure Systems
Lattice-based access
control models (LBAC) initiated by Bell-LaPadula(BLP), Biba
models, and consolidated by Denning have played a vital role
inbuilding secure systems via Information Flow Control (IFC).
IFC systems typicallylabel data and track labels, while allowing
users to exercise appropriateaccess privileges. This is defined
through a finite set of security classes over a lattice. Recently,
IFC has also been playing a crucial role in formally establishing
the security of operating systems/programs. Towards such a
goal, researchers oftenuse assertions to keep track of the
flow of information from one subject/objectto another object/subject.
Specifying and realizing these assertions will be greatlybenefitted,
if the underlying labels of objects/subjects can be interpreted
in termsof access permissions/rights of subjects/objects as
well as subjects/objects thathave influenced them; these would
lead to automatic generation of proof obligations/assertions.
Thus, if one can arrive at a label model for LBAC that satisfiesproperties
like (i) intuitive and expressive labels, (ii) completeness
w.r.t.Denning’s lattice model, and (iii) efficient computations
on labels, then building/certifying secure systems using LBAC
will be greatly benefitted. In this presentation, we provide
an overview of various security models and discuss some of
the recent Information Flow security models that are being
projected as the foundation for building secure operating
systems and on language-based security.
|