CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL

被引:2
|
作者
BOOYSEN, HAS
ELOFF, JHP
机构
[1] Department of Computer Science, Rand Afrikaans University, Johannesburg, 2006
关键词
INFORMATION SECURITY; SECURITY CLASS; ENTROPY; OBJECT;
D O I
10.1016/0167-4048(95)00001-O
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control mechanisms usually control accesses between objects and subjects in a computing system. Objects in a computing environment are ranked according to a security class hierarchy to facilitate the operation of access control mechanisms. At present the process of allocating a security class to an object is solely based on human judgment. The objective of the framework as proposed in this paper is not to eliminate human judgment, but rather to assist the process oi allocating security classes to objects. Concepts borrowed from classical information theory, such as entropy, are applied in the process of allocating security classes to objects, resulting in a so-called mechanical component of a security class for an object.
引用
收藏
页码:251 / 265
页数:15
相关论文
共 50 条
  • [31] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    [J]. NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292
  • [32] LOCAL AREA NETWORK - MEDIUM ACCESS-CONTROL
    ROLIN, P
    [J]. ONDE ELECTRIQUE, 1989, 69 (05): : 14 - 21
  • [33] A TDMA BASED ACCESS-CONTROL SCHEME FOR APONS
    ANGELOPOULOS, JD
    VENIERIS, IS
    STASSINOPOULOS, GI
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 1993, 11 (5-6) : 1095 - 1103
  • [34] Effective visualization of file system access-control
    Heitzmann, Alexander
    Palazzi, Bernardo
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 18 - 25
  • [35] TYPICAL SYSTEM ACCESS-CONTROL PROBLEMS AND SOLUTIONS
    KARREN, DT
    [J]. INFORMATION AGE, 1988, 10 (01): : 23 - 32
  • [36] A general and flexible access-control system for the web
    Bauer, L
    Schneider, MA
    Felten, EW
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 93 - 108
  • [37] ACCESS-CONTROL SYSTEMS FOR RADIOTHERAPY TREATMENT ROOMS
    ALDRICH, JE
    BERKEY, J
    [J]. MEDICAL PHYSICS, 1988, 15 (06) : 930 - 931
  • [38] ACCESS-CONTROL WITH SINGLE-KEY-LOCK
    WU, ML
    HWANG, TY
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (02) : 185 - 191
  • [39] A BUILDING ACCESS-CONTROL SYSTEM WITH ALARM MONITORING
    SANZ, JV
    VIVES, JQ
    DELCAMPO, AF
    [J]. MICROPROCESSING AND MICROPROGRAMMING, 1983, 12 (02): : 111 - 114
  • [40] Automatic Error Finding in Access-Control Policies
    Jayaraman, Karthick
    Ganesh, Vijay
    Tripunitara, Mahesh
    Rinard, Martin
    Chapin, Steve
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 163 - 174