The Entity Labeling Pattern for Modeling Operating Systems Access Control
نویسنده
چکیده
To meet tightening security requirements, modern operating systems enforce mandatory access control based on formal security policies. To ensure the critical property of policy correctness, formal methods and models for both their specification and verification are used. The variety of these approaches reflects the diversity and heterogeneity of policy semantics, which makes policy engineering an intricate and error-prone process. Therefore, a common formal framework is needed that unifies both diverse access control systems on the one hand and diverse formal criteria of correctness on the other hand. This paper presents a step towards this goal. We propose to leverage core-based model engineering, a uniform approach to policy formalization, and refine it by adding typical semantic abstractions of contemporary policy-controlled operating systems. This results in a simple, yet highly flexible framework for formalization, specification and analysis of operating system security policies. We substantiate this claim by applying our method to the SELinux system and demonstrating the practical usage of the resulting model.
منابع مشابه
An Improved Modular Modeling for Analysis of Closed-Cycle Absorption Cooling Systems
A detailed modular modeling of an absorbent cooling system is presented in this paper. The model including the key components is described in terms of design parameters, inputs, control variables, and outputs. The model is used to simulate the operating conditions for estimating the behavior of individual components and system performance, and to conduct a sensitivity analysis based on the give...
متن کاملUsing Internal Auditing in E-Banks and E-Credit Financial Institutes
Internal audit is a process affected by an entity ‘s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting and compliance. This definition reflects certain fundamental concepts. Internal control is: • Geared to achievement of objectives in one or more categories operations, reporti...
متن کاملA Mathematical Model for Operating Room Scheduling Considering Limitations on Human Resources Access and Patient Prioritization
Operating room scheduling is an important task in healthcare sector. This study proposes a Mixed Integer Nonlinear Programming (MINLP) mathematical model for the scheduling of the operating rooms. In the presented model, apart from scheduling the patients’ surgery process, shifting of the medical staff is also carried out. The innovation considered in the proposed model is aimed at prioritizing...
متن کاملA Survey of Concurrency Control Algorithms in the Operating Systems
Concurrency control is one of the important problems in operation systems. Various studies have been reported to present different algorithms to address this problem, although a few attempts have been made to represent an overall view of the characteristics of these algorithms and comparison of their capabilities to each other. This paper presents a survey of the current methods for controlling...
متن کاملA Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment
The research communitiy has shown considerable interest in studying access control in single Trusted Operating Systems (TOS). However, interactions among multiple TOSs have attracted relatively little attention. In this paper, we propose a Collaborative Role-Based Access Control (C-RBAC) model for distributed systems in which accesses across system domain boundaries are allowed. Access entities...
متن کامل