Reference Monitor

نویسنده

  • Trent Jaeger
چکیده

Related Concepts – Access control – Access control policy – Security kernel Definition A reference monitor concept defines a set of design requirements on a reference validation mechanism, which enforces an access control policy over subjects' (e.g., processes and users) ability to perform operations (e.g., read and write) on objects (e.g., files and sockets) on a system. – The reference validation mechanism must always be invoked (complete mediation). – The reference validation mechanism must be tamperproof (tamperproof). – The reference validation mechanism must be small enough to be subject to analysis and tests, the completeness of which can be assured (verifiable). The claim is that a reference validation mechanism that satisfies the reference monitor concept will correctly enforce a system's access control policy, as it must be invoked to mediate all security-sensitive operations, must not be tampered, and has undergone complete analysis and testing to verify correctness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analytical Performance and Quality Control of a Glucose Monitor System

  Background and Objective: The reliability and validity of monitors for self-monitoring of blood glucose are debated. We evaluated the analytical performance of Accu-check Active (Boehringer Mannheim, Roche) which is one of the most commonly used monitors in Iran. Material and Methods: We compared the monitor readings with the reference values by percentage of values within...

متن کامل

Usage Control: A Vision for Next Generation Access Control

Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Pr...

متن کامل

Excerpts - A Reference Monitor for Workflow Systems with Constrained Task Execution

Review, Excerpts A Reference Monitor for Workflow Systems with Constrained Task Execution Jason Crampton, Information Security Group Royal Holloway, University of London

متن کامل

Securing Commercial Operating Systems

Since the discovery of the reference monitor concept during the development of Multics, there have been many projects to retrofit existing commercial operating systems with a true reference monitor implementation. Successful, commercial operating systems can have a large customer base and a variety of popular applications. As a result, those customers with strong secrecy and integrity requireme...

متن کامل

A Work ow Reference Monitor for Enforcing Purpose-Based Policies

Purpose is a key concept in privacy policies. Based on the purpose framework developed in our earlier work [11] we present an access control model for a work ow-based information system in which a work ows reference monitor ( WfRM ) enforces purpose-based policies. We use a generic access control policy language and show how it can be connected to the purpose modal logic language ( PML ) to lin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011