R.K. Shyamasundar

Department of Computer Science and Engineering
IIT Bombay

Indian Institute of Science

R K Shyamasundar is a Fellow of IEEE, a Fellow of ACM, Distinguished ACM Speaker, a Distingusihed Alumnus of Indian Institute of Science, served as IEEE Distinguished Speaker, is currently JC Bose National Fellow, Distinguished V. Professor at the Department of Computer Science, IIT Bombay where he is the principla investigator of the Information Security Research and Development Centre (ISRDC) from Ministry of Electronics and Information Technology (MeiTY) from the Govt. of India. He was awarded the 2014 SN Mitra award for excellence in research by the Indian National Academy of Engineering. Since 2015, he is also the
Scholar-in-Residence at IIT Jodhpur. He is the founding Dean of the School of Technology and Computer Science at TIFR. He has made outstanding contributions to Real-Time Distributed Computing, Logics of Programs, Network and Computer Security. His research interests include distributed real-time systems, Logics
of Programs, Concurrent and Parallel programming Languages, Formal Methods, Cyber Security etc. He has more than 300 publications, 8 books, 8 international patents, 3 Indian patents, and 3 Best Paper Awards. Thirty five students have completed Ph.D. under his guidance, has served on IEEE Esterel Standards and served as consultant to ESPRIT projects. He did post doctoral work under the legendary Turing Laureate Professor Dr. Edsgar W. Dijkstra and was a Distinguished Visiting fellow under the UK Royal Academy of Engineering at the Computing Laboratory of University of Cambridge. He has also served as a Distinguished Visiting Fellow by the UK Royal Academy of Engineering in 2016 at the City University of London. He has served as Faculty/Staff at IBM TJ Research, Eindhoven University, State University of Utrecht, Pennsylvania State University, University of Illinois, University of California at San Diego at Lajolla, University of Cambridge, University of Linkoping, SUNU at Albany, UNM at Albuquerque, IRISA, INRIA, CWI, JAIST Japan, Max Planck Institute , IBM
Research India etc.
He was Founding Chair of conference series Foundations of Software Technology and Theoretical Computer Science (FSTTCS), founding President of Indian Association of Research in Computing Science (IARCS.), founding Dean of School of Technology and Computer Science and Founder of the Center for Formal Designa and verification of Software as a tri-partite center among BARC, TIFR and IIT Bombay) located at IIT Bombay.
He serves/served on the Governing Council of IIIT Allahabad, IIIT Jabalpur, CSIR Centre CMMACS (CSIR-FPI) Bangalore , serves on the Technical Advisory Board of BSE (Bombay Stock Exchange), and Research Advisory Board for Institute of Development and Research in Banking Technology (IDRBT) of RBI at Hyderabad.


He is a Fellow of Indian Academy of Sciences, Indian National Science Academy, National Academy of Sciences, National Academy of Engineering, India and a Fellow of the Academy of Sciences of the Developing world (TWAS), Trieste, Italy.


He has served on IEEE Esterel Standards Committee and serves on the Editorial board of Journal of Parallel and Distributed Computing, corersponding editor for Sadhana- Journal of Engineering Sciences of the Indian Academy of Sciences etc. He is a receipient of Diamond Jubilee medal from IETE and also its’ Fellow.

Title: Security Models as a Foundation for Building End-to-End Secure Systems

Lattice-based access control models (LBAC) initiated by Bell-LaPadula(BLP), Biba models, and consolidated by Denning have played a vital role inbuilding secure systems via Information Flow Control (IFC). IFC systems typicallylabel data and track labels, while allowing users to exercise appropriateaccess privileges. This is defined through a finite set of security classes over a lattice. Recently, IFC has also been playing a crucial role in formally establishing the security of operating systems/programs. Towards such a goal, researchers oftenuse assertions to keep track of the flow of information from one subject/objectto another object/subject. Specifying and realizing these assertions will be greatlybenefitted, if the underlying labels of objects/subjects can be interpreted in termsof access permissions/rights of subjects/objects as well as subjects/objects thathave influenced them; these would lead to automatic generation of proof obligations/assertions. Thus, if one can arrive at a label model for LBAC that satisfiesproperties like (i) intuitive and expressive labels, (ii) completeness w.r.t.Denning’s lattice model, and (iii) efficient computations on labels, then building/certifying secure systems using LBAC will be greatly benefitted. In this presentation, we provide an overview of various security models and discuss some of the recent Information Flow security models that are being projected as the foundation for building secure operating systems and on language-based security.

 

 

Jaypee Institute of Information Technology
A-10, Sector 62, Noida-201307, Uttar Pradesh, India
Copyright © 2007 All Rights Reserved.

Best viewed in Internet Explorer 5.0 + with 1024 x 768 Resolution