SPECIFYING DISCRETIONARY ACCESS-CONTROL POLICY FOR DISTRIBUTED SYSTEMS

被引:16
|
作者
MOFFETT, J
SLOMAN, M
TWIDLE, K
机构
[1] Department of Computing, Imperial College, London, SW7 2BZ
关键词
access control lists; access control policy; authority; distributed systems; domains; security management;
D O I
10.1016/0140-3664(90)90008-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses a proposed framework for specifying access control policy for very large distributed processing systems. These typically consist of multiple interconnected networks and span the computer systems belonging to different organizations. This implies the need for cooperation between independent managers to specify access control policy. The policy specification should permit interaction between organizations while limiting the scope of what objects can be accessed and what operations can be performed on them. The large numbers of objects in such systems make it impractical to specify access control policy in terms of individual objects. The paper explains how domains can be used to group objects and structure the management of access control policy. Access rules are introduced as a means of specifying the access rights between a domain of user objects and a domain of target objects in terms of the permitted operations as well as constraints such as user location and time of day. The use of domains for specifying the scope for which authority can be delegated to managers or security administrators is explained and the issues related to implementing access rules using capabilities or access control lists are discussed. © 1990.
引用
收藏
页码:571 / 580
页数:10
相关论文
共 50 条
  • [1] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    [J]. 2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [2] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [3] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [4] DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS
    BORN, E
    STIEGLER, H
    [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 437 - 450
  • [5] Efficient proving for practical distributed access-control systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 19 - +
  • [6] CONTEXT-DEPENDENT ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    STRACK, H
    LAM, KY
    [J]. COMPUTER SECURITY, 1993, 37 : 137 - 155
  • [7] Detecting and Resolving Policy Misconfigurations in Access-Control Systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 185 - 194
  • [8] AUTHENTICATION AND DISCRETIONARY ACCESS-CONTROL IN COMPUTER-NETWORKS
    KARGER, PA
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (01): : 27 - 37
  • [9] Detecting and Resolving Policy Misconfigurations in Access-Control Systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [10] Specifying and reasoning about dynamic access-control policies
    Dougherty, Daniel J.
    Fisler, Kathi
    Krishnamurthi, Shriram
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 632 - 646