Meca: A Tool for Access Control Models
نویسنده
چکیده
Access Control is a technique which insures security by preserving confidentiality and integrity of information. Meca (Models for access control) is a tool which generates, in a B machine, operational conditions that should be verified by an application to insure security. The inputs of Meca are a B machine offering a format for presenting a security model and a functional model containing the presentation of an application with its sensitive entities like variables and operations. The format of a security model provides a declarative representation of the access distribution in the system at a given moment. It is done according to various models related to three branches policies: discretionary policies model (DAC)[4], Bell and LaPadula model (BLP) [1], Biba model (Biba) [2] and role based access control model (RBAC) [3]. Meca generates access rules in a B machine called security kernel. Security kernel offers secure services under witch sensitive entities of functional model can be manipulated. The format of the security kernel varies depending of the security policy model type. In access control scope, Objects are passive entities that represent system resources and should be protected. Subjects are active entities accessing to objects and possessing rights to manipulate them. Figure 1 presents Meca with his inputs and outputs components. We illustrate our approach and Meca with a small part of a bank card example.
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کامل