On safety in discretionary access control

被引:0
|
作者
Li, NH [1 ]
Tripunitara, MV [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decidable. In this paper we dispel this myth. We argue that DAC should not be equated with the Harrison-Ruzzo-Ullman access matrix scheme [10], in which safety is undecidable. We present an efficient (running time cubic in its input size) algorithm for deciding safety in the Graham-Denning DAC scheme [8], which subsumes the DAC schemes used in the literature on comparing DAC with other access control models. We also counter several claims made in recent work by Solworth and Sloan [27], in which the authors present a new access control scheme based on labels and relabelling and assert that it can implement the full range of DAC models. We present a precise characterization of their access control scheme and show that it does not adequately capture a relatively simple DAC scheme.
引用
收藏
页码:96 / 109
页数:14
相关论文
共 50 条
  • [2] The complexity of discretionary access control
    Dranger, Stephen
    Sloan, Robert H.
    Solworth, Jon A.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 405 - 420
  • [3] A type system for Discretionary Access Control
    Bugliesi, Michele
    Colazzo, Dario
    Crafa, Silvia
    Macedonio, Damiano
    [J]. MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2009, 19 (04) : 839 - 875
  • [4] Type based discretionary access control
    Bugliesi, M
    Colazzo, D
    Crafa, S
    [J]. CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239
  • [5] Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
    Minami, Kazuhiro
    Borisov, Nikita
    Gunter, Carl A.
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 3 - 12
  • [6] Trojan Horse Resistant Discretionary Access Control
    Mao, Ziqing
    Li, Ninghui
    Chen, Hong
    Jiang, Xuxian
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 237 - 246
  • [7] Towards a mechanism for discretionary overriding of access control
    Rissanen, Erik
    Firozabadi, Babak Sadighi
    Sergot, Marek
    [J]. SECURITY PROTOCOLS, 2006, 3957 : 312 - 323
  • [8] Discretionary overriding of access control in the privilege calculus
    Rissanen, E
    Firozabadi, BS
    Sergot, M
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 219 - 232
  • [9] A Discretionary Delegation Framework for Access Control Systems
    Khan, M. Fahim Ferdous
    Sakamura, Ken
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 865 - 882
  • [10] A layered design of discretionary access controls with decidable safety properties
    Solworth, JA
    Sloan, RH
    [J]. 2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 56 - 67