TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK

Lei Xia, Hao Huang, Shuying Yu

2007

Abstract

With increasing diversity and complexity of the computing environments, various security needs in one system can no longer be met by single access control model at the same time. An operating system should be able to enforce multiple access control models. A Multi-Model Views Security Framework is proposed, which is able to enforce multiple access control model views in operating system flexibly.

References

  1. Badger, L., Sterne, D. F. and Sherman, D. L., et al, 1995. A Domain and Type Enforcement UNIX Prototype. In Proceedings of the Fifth USENIX UNIX Security Symposium.
  2. Bell, D. and LaPadula, L., 1975. “Secure Computer Systems: Mathematical Foundations”, Technical Report MTR-2547, MITRE Corporation, Vol. I, MTR-2997 Rev.1.
  3. Biba, K., 1977. Integrity Considerations for Secure Computer Systems. MITRE Corporation, Technical Report MTR-3153.
  4. Dion, L. C., 1981. A complete protection model. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 49-55.
  5. Organick, E., 1972. The MULTICS System: An Examination of Its Structure. The MIT Press.
  6. Osborn, S., Sandhu, R. and Munawer, Q., 2000. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, Vol.3, No.2, Pages 85-106.
  7. Rushby, J., 1992. Noninterference, Transitivity, and Channel-Control Security Policies. Computer Science Lab, SRI International, Technical Report CSL-92-02.
  8. Sandhu, R., Coyne, E., Feinstein, H. and Youman, C., 1996. Role-Based Access Control. IEEE Computer. Vol.29, No.2.
  9. Sandhu, R., 1997. Rational for the RBAC96 Family of Access Control Models. In Proceedings of 1st ACM Workshop on Role-based Access Control.
  10. Walker, K. M., Sterne, D. F. and Badger, M. L., et al, 1996. Confining Root Programs with Domain and Type Enforcement (DTE). In Proceedings of the 6th USENIX UNIX Security Symposium.
Download


Paper Citation


in Harvard Style

Xia L., Huang H. and Yu S. (2007). TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 98-101. DOI: 10.5220/0002126200980101


in Bibtex Style

@conference{secrypt07,
author={Lei Xia and Hao Huang and Shuying Yu},
title={TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={98-101},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002126200980101},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK
SN - 978-989-8111-12-8
AU - Xia L.
AU - Huang H.
AU - Yu S.
PY - 2007
SP - 98
EP - 101
DO - 10.5220/0002126200980101