A FORMAL PROTECTION MODEL OF SECURITY IN CENTRALIZED, PARALLEL, AND DISTRIBUTED SYSTEMS

被引:2
|
作者
BENSON, GS [1 ]
AKYILDIZ, IF [1 ]
APPELBE, WF [1 ]
机构
[1] GEORGIA INST TECHNOL, COLL COMPUT, ATLANTA, GA 30332 USA
来源
关键词
DESIGN; SECURITY; ACCESS CONTROL; CONCURRENCY CONTROL; DISTRIBUTED SYSTEM SECURITY; OPERATING SYSTEM SECURITY; PROTECTION MODEL;
D O I
10.1145/99926.99928
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One way to show that a system is not secure is to demonstrate that a malicious or mistake-prone user or program can break security by causing the system to reach a nonsecure state. A fundamental aspect of a security model is a proof that validates that every state reachable from a secure initial state is secure. A sequential security model assumes that every command that acts as a state transition executes sequentially, while a concurrent security model assumes that multiple commands execute concurrently. This paper presents a security model called the Centralized-Parallel-Distributed model (CPD model) that defines security for logically, or physically centralized, parallel, and distributed systems. The purpose of the CPD model is to define concurrency conditions that guarantee that a concurrent system cannot reach a state in which privileges are configured in a nonsecure manner. As an example, the conditions are used to construct a representation of a distributed system.
引用
收藏
页码:183 / 213
页数:31
相关论文
共 50 条
  • [31] A knowledgeable security model for distributed health information systems
    Xiao, Liang
    Hu, Bo
    Croitoru, Madalina
    Lewis, Paul
    Dasmahapatra, Srinandan
    COMPUTERS & SECURITY, 2010, 29 (03) : 331 - 349
  • [32] A SECURITY SIMULATION MODEL FOR LARGE SCALE DISTRIBUTED SYSTEMS
    Dobre, Ciprian
    Constantin, Florina
    Pop, Florin
    Cristea, Valentin
    EUROPEAN SIMULATION AND MODELLING CONFERENCE 2010, 2010, : 45 - 50
  • [33] New security infrastructure model for distributed computing systems
    Dubenskaya, J.
    Kryukov, A.
    Demichev, A.
    Prikhodko, N.
    INTERNATIONAL CONFERENCE ON COMPUTER SIMULATION IN PHYSICS AND BEYOND 2015, 2016, 681
  • [34] A hybrid trust model for enhancing security in distributed systems
    Lin, Ching
    Varadharajan, Vijay
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 35 - +
  • [35] Active Distribution Network Protection Mode Based on Coordination of Distributed and Centralized Protection
    Song, Xiaohui
    Zhang, Yu
    Zhang, Song
    Song, Shizhan
    Ma, Jing
    Zhang, Weibo
    PROCEEDINGS OF 2017 CHINA INTERNATIONAL ELECTRICAL AND ENERGY CONFERENCE (CIEEC 2017), 2017, : 180 - 183
  • [36] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [37] Formal security model of multisignatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 146 - 160
  • [38] SECURITY FOR DISTRIBUTED SYSTEMS
    TRUEMAN, P
    DATA PROCESSING, 1986, 28 (04): : 187 - 190
  • [39] Formal Specification and Verification of an Extended Security Policy Model for Database Systems
    Hong, Zhu
    Yi, Zhu
    Li Chenyang
    Jie, Shi
    Ge, Fu
    Wang Yuanzhen
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 132 - 141
  • [40] Centralized Control for Parallel Operation of Distributed Generation Inverters in Microgrids
    Tan, K. T.
    Peng, X. Y.
    So, P. L.
    Chu, Y. C.
    Chen, M. Z. Q.
    IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (04) : 1977 - 1987