Is the Reference Monitor Concept Fatally Flawed? The Case for the Negative
نویسندگان
چکیده
Traditionally, the burden of proof in a debate rests upon the affirmative side of the resolution, which is worded to advocate change. here, this is just as it should be. The reference monitor (RM) model has passed the critical test imposed by the methodology of science: it has been a productive concept for the field of computer security since its introduction. The call to abandon a productive model, however intellectually stimulating, should not be heeded simply for the sake of novelty. It is our hope that this debate will stimulate an examination of foundations, but we do not believe that such an examination, carefully undertaken, supports the affirmative case. There are several related topics which are not the focus of this discussion. We will not discuss the merits or demerits of any particular access control policy: the RM model is neutral with respect to policy enforced. We will not discuss the merits or demerits of any particular criterion based upon the RM model: the model precedes these and is not responsible for infelicities that may occur in a particular application of the model. We will not discuss architectural instantiations of the model: e.g. a “monolithic” instantiation versus a partitioned, subsetted, or even more radically distributed instantiation. No one is claiming that only monolithic or homogeneous implementations are encompassed by the model: quite the contrary. The resolution is the conjunction of two propositions, both of which must be successfully argued by the opposition: First, that the RM model is “fatally flawed”. We understand this to mean, not “incomplete” (for the RM model is manifestly incomplete, being policyneutral). Rather, we understand this to mean that the model does not deliver what it promises: an abstract model of prerequisites to be met by any system that claims to be “secure” with respect to the enforcement of access controls. With respect to this position, the negative case will be based upon arguments that if any of the three primary ingredients of the model are sacrificed, the resulting system is demonstrably insecure, in that an approach for compromising the controls is
منابع مشابه
Analytical Performance and Quality Control of a Glucose Monitor System
Background and Objective: The reliability and validity of monitors for self-monitoring of blood glucose are debated. We evaluated the analytical performance of Accu-check Active (Boehringer Mannheim, Roche) which is one of the most commonly used monitors in Iran. Material and Methods: We compared the monitor readings with the reference values by percentage of values within...
متن کاملPersonal Credit Score Prediction using Data Mining Algorithms (Case Study: Bank Customers)
Knowledge and information extraction from data is an age-old concept in scientific studies. In industrial decision-making processes, the application of this concept gives rise to data-mining opportunities. Personal credit scoring is an ever-vital tool for banking systems in order to manage and minimize the inherent risks of the financial sector, thus, the design and improvement of credit scorin...
متن کاملA New Uni-attribute Control Chart to Monitor the Number of Nonconformities
The most well-known uni-arribute control chart used to monitor the number of nonconformities per unit is the Shewhart type C-chart. In this paper, a new method is proposed in an attempt to reduce the false alarm rate in the C-chart. To do this, the decision on beliefs (DOB) concept is first uti [1] Corresponding author e-mail: [email protected] lized to design an iterative method, where...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کامل