A Logical Approach to Access Control, Security, and Trust

نویسنده

  • Shiu-Kai Chin
چکیده

Designers, auditors, and certifiers of trustworthy systems must rigorously assess compliance with security policies. Because security is best built into systems at all levels of abstraction, engineers and other practitioners who design, verify, or certify trustworthy systems need the capability to reason rigorously about security policies in general, and access decisions in particular. What is required is a logic or calculus general enough to be useful from the concrete hardware level to the abstract policy level that also captures access-control concepts such as authorization, certified statements, jurisdiction, and delegation. Ideally, this calculus should be straightforward for practitioners to use, much like the propositional logic used in hardware design by engineers. We have created an accesscontrol logic that meets these requirements and have used this logic to account for security, trust, and access policies in hardware, software, protocols, and concepts of operations. We give an overview of the logic and its application to hardware, protocols, and policy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control, Security, and Trust - A Logical Approach

and trust are among the greatest risks—compliance and otherwise—facing corporations today. Controlling access to protected objects is central to any security program, and the foundation of Access Control, Security, and Trust: A Logical Approach is straightforward: Reference monitors are the means to protect objects of value in systems. Access Control, Security, and Trust: A Logical Approach is ...

متن کامل

A Smart Card Solution for Access Control and Trust Management for Nomadic Users

Increasing efforts are placed on security solutions for nomadic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security. Nevertheless, such solutions concentrate only on offering the cryptographical capabilities of the smart card, together with key and user certificate storage. Advanced trust management and access control are not add...

متن کامل

TBA : A Hybrid of Logic and Extensional Access Control Systems

Logical policy-based access control models are greatly expressive and thus provide the flexibility for administrators to represent a wide variety of authorization policies. Extensional access control models, on the other hand, utilize simple data structures to better enable a less trained and non-administrative workforce to participate in the day-to-day operations of the system. In this paper, ...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Secondary use of data in EHR systems

We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies policies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010