CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL

被引:2
|
作者
BOOYSEN, HAS
ELOFF, JHP
机构
[1] Department of Computer Science, Rand Afrikaans University, Johannesburg, 2006
关键词
INFORMATION SECURITY; SECURITY CLASS; ENTROPY; OBJECT;
D O I
10.1016/0167-4048(95)00001-O
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control mechanisms usually control accesses between objects and subjects in a computing system. Objects in a computing environment are ranked according to a security class hierarchy to facilitate the operation of access control mechanisms. At present the process of allocating a security class to an object is solely based on human judgment. The objective of the framework as proposed in this paper is not to eliminate human judgment, but rather to assist the process oi allocating security classes to objects. Concepts borrowed from classical information theory, such as entropy, are applied in the process of allocating security classes to objects, resulting in a so-called mechanical component of a security class for an object.
引用
收藏
页码:251 / 265
页数:15
相关论文
共 50 条
  • [1] EXTENDING OBJECTS TO SUPPORT MULTIPLE INTERFACES AND ACCESS-CONTROL
    HAILPERN, B
    OSSHER, H
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (11) : 1247 - 1257
  • [2] ARCHITECTURAL ACCESS-CONTROL
    KNOPP, SL
    [J]. PROGRESSIVE ARCHITECTURE, 1988, 69 (04): : 146 - &
  • [3] ACCESS-CONTROL SOFTWARE
    FRIEDMAN, M
    [J]. INFORMATION AGE, 1988, 10 (03): : 157 - 161
  • [4] ACCESS-CONTROL - PRINCIPLES AND PRACTICE
    SANDHU, RS
    SAMARATI, P
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) : 40 - 48
  • [5] ACCESS-CONTROL WITH BINARY KEYS
    CHANG, CC
    SHEN, JJ
    WU, TC
    [J]. COMPUTERS & SECURITY, 1994, 13 (08) : 681 - 686
  • [6] LANGUAGE FEATURES FOR ACCESS-CONTROL
    ANCILOTTI, P
    BOARI, M
    LIJTMAER, N
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (01) : 16 - 25
  • [7] DATA ACCESS-CONTROL MODEL
    PINKERTON, JMM
    [J]. INFORMATION PRIVACY, 1981, 3 (05): : 181 - 185
  • [8] ACCESS-CONTROL AND AUTHENTICATION IN LANS
    GASSER, M
    [J]. LOCAL AREA NETWORK SECURITY, 1989, 396 : 19 - 29
  • [9] ACCESS-CONTROL SYSTEMS FOR SECURITY
    MENKUS, B
    [J]. OFFICE ADMINISTRATION AND AUTOMATION, 1984, 45 (04): : 57 - &
  • [10] CRYPTANALYSIS ON AN ACCESS-CONTROL IN A HIERARCHY
    CHANG, CC
    FAN, SW
    LIAW, HT
    CHIOU, MY
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1995, 29 (04) : 69 - 72