Implementation of theExtended Schematic Protection

نویسندگان

  • Paul Ammann
  • Ravi S. Sandhu
  • Gurpreet S. Suri
چکیده

Protection models provide a formalism for specifying control over access to information and other resources in a multiuser computer system. One such model, the Extended Schematic Protection Model (ESPM), has expressive power equivalent to the mono-tonic access matrix model of Harrison, Ruzzo, and Ullman 7]. Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. In this paper, we outline a distributed implementation for ESPM. Our implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made non-transferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of the Extended Schematic Protection Model Paul

Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the Extended Schematic Protection Model (ESPM), has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman [7]. Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus E...

متن کامل

Implementation of the Extended Schematic Protection Model

Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the Extended Schematic Protection Model (ESPM), has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman [7]. Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus E...

متن کامل

The Demand Operation in the Schematic Protection Model

We show the demand operation in the schematic protection model is redundant in that it can be simulated by copy and create operations. We also consider to what extent ampli cation (or conditional demand) can be simulated by similar constructions.

متن کامل

Task - Based Authorization : a Paradigm for Flexible and Adaptable

Historically, the access control problem has been couched within the framework of subjects, objects, and rights (access types). An access control request thus essentially seeks an answer to a question posed typically as: Is subject s allowed access a (or possess the right a) to object o? A tuple (s; o; a), which we de ne as an authorization, can be input to a function f , which returns true (or...

متن کامل

The Demand Operation in theSchematic Protection

We show the demand operation in the schematic protection model is redundant in that it can be simulated by copy and create operations. We also consider to what extent ampli cation (or conditional demand) can be simulated by similar constructions.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1991