Security Property Based Administrative Controls
نویسندگان
چکیده
Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with first order predicate logic or graph rewriting rules. We introduce a new access control model to implement administrative controls directly in terms of the security properties—we call this Security Property Based Administrative Controls (SPBAC). Administrative approval is required only when a security property is changed (violated) relative to the current configuration. We show that in the case of information flow, and its effects on both integrity and confidentiality, SPBACs are implementable, and the necessary administrative approvals exactly determinable.
منابع مشابه
It Security Investments through the Lens of the Resource-based View: a New Theoretical Model and Literature Review
IT security has become a major issue for organizations as they need to protect their assets, including IT resources, intellectual property and business processes, against security attacks. Disruptions of ITbased business activities can easily lead to economic damage, such as loss of productivity, revenue and
متن کاملDecidable Administrative Controls based on Security Properties
It is a desirable goal for a protection system to be expressive (providing the desired protections), robust (enabling the system to change without invalidating protections), and analyzable (so it can be understood which protections are provided). Of particular interest in analyzing a system is the decidability of security properties. If the system is not analyzable, how does one know what prote...
متن کاملE-Commerce Software Security based on Risk Management Perspective: A Literature Survey
In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organizations appear to have understood the necessity for computer security, especially data security. Electronic commerce can help enterprises reducing costs, obtaining gre...
متن کاملSecurity Evaluation Model based on the Score of Security Mechanisms
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
متن کاملSecurity Evaluation Model based on the Score of Security Mechansisms
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
متن کامل