Modeling Mandatory Access Control in Role-Based Security Systems

نویسندگان

  • Matunda Nyanchama
  • Sylvia L. Osborn
چکیده

This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic de nitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information ow among contexts in role-based protection systems. The acyclic information ows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Stateful Design for Secure Information Systems

The unified modeling language (UML) has gained wide acceptance for the design of component-based applications via diagrams (e.g., use-case, class, sequence, activity, etc.) for representing functional requirements. However, UML is lacking in its ability to model security requirements, an increasing need in today's applications. This paper presents and explains techniques that support stateful a...

متن کامل

Stateful Design for Secure Information Systems1

The unified modeling language (UML) has gained wide acceptance for the design of component-based applications via diagrams (e.g., use-case, class, sequence, activity, etc.) for representing functional requirements. However, UML is lacking in its ability to model security requirements, an increasing need in today's applications. This paper presents and explains techniques that support stateful a...

متن کامل

Enhancing UML to Model Custom Security Aspects

Despite its widespread usage, the Unified Modeling Language (UML) specification still lacks formal, explicit, support for access control. This paper proposes an approach to model security as a separate concern by augmenting UML with separate and new diagrams for role-based, discretionary, and mandatory access controls; collectively, these diagrams provide visual access-control aspects. Individu...

متن کامل

Database Access Control Policies

As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995