Security assurance for an RBAC/MAC security model

被引:0
|
作者
Phillips, CE [1 ]
Demurjian, SA [1 ]
Ting, TC [1 ]
机构
[1] US Mil Acad, EE&CS Dept, W Point, NY 10996 USA
关键词
D O I
10.1109/SMCSIA.2003.1232431
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Corporations and government agencies rely on inter-operating software artifacts (e.g., legacy, COTS, GOTS, databases, servers, etc.) and client applications, brought together by middleware (e.g., CORBA, JINI, NET, etc.), supporting unrestricted access to application programmer interfaces, APIs. As part of our ongoing research, we have designed and prototyped a unified role-based/mandatory access control (RBAC/MAC) security model with delegation and enforcement to control access by users (via clients) to the methods of artifact APIs, namely: who (user/client) can invoke which methods of artifact APIs at what times. Underlying our RBAC/MAC framework are security assurance rules, SARs, which provide a confidence level on the attainment of an application's security policy. In this paper, we focus on the formal underpinnings of our security assurance research, its realization during security policy definition with management tools, and at runtime by the enforcement framework.
引用
收藏
页码:260 / 267
页数:8
相关论文
共 50 条
  • [1] Safety and liveness for an RBAC/MAC security model
    Phillips, C
    Demurjian, S
    Ting, TC
    [J]. DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 316 - 329
  • [2] Security Sandbox Based on RBAC Model
    Hurtuk, Jan
    Balaz, Anton
    Adam, Norbert
    [J]. 2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 75 - 79
  • [3] Integration of systematic RBAC security model and UML model
    Fan, Baode
    [J]. ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2383 - 2386
  • [4] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [5] Security analysis of temporal RBAC under an administrative model
    Jha, Sadhana
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2014, 46 : 154 - 172
  • [6] A Security Management Assurance Model to holistically assess the Information Security posture
    Tashi, Igli
    Ghernaouti-Helie, Solange
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 756 - 761
  • [7] Security Assurance
    Lipner, Steven B.
    [J]. COMMUNICATIONS OF THE ACM, 2015, 58 (11) : 24 - 26
  • [8] Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach
    Mondal, Samrat
    Sural, Shamik
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 319 - 328
  • [9] A Preliminary Structure of Software Security Assurance Model
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    [J]. PROCEEDINGS 2018 ACM/IEEE 13TH INTERNATIONAL CONFERENCE ON GLOBAL SOFTWARE ENGINEERING ICGSE 2018, 2018, : 137 - 140
  • [10] Model-Based Assurance of Security Controls
    Beres, Yolanta
    Baldwin, Adrian
    Shiu, Simon
    [J]. QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 55 - 55