CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL

被引:2
|
作者
BOOYSEN, HAS
ELOFF, JHP
机构
[1] Department of Computer Science, Rand Afrikaans University, Johannesburg, 2006
关键词
INFORMATION SECURITY; SECURITY CLASS; ENTROPY; OBJECT;
D O I
10.1016/0167-4048(95)00001-O
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control mechanisms usually control accesses between objects and subjects in a computing system. Objects in a computing environment are ranked according to a security class hierarchy to facilitate the operation of access control mechanisms. At present the process of allocating a security class to an object is solely based on human judgment. The objective of the framework as proposed in this paper is not to eliminate human judgment, but rather to assist the process oi allocating security classes to objects. Concepts borrowed from classical information theory, such as entropy, are applied in the process of allocating security classes to objects, resulting in a so-called mechanical component of a security class for an object.
引用
收藏
页码:251 / 265
页数:15
相关论文
共 50 条
  • [41] IMPROVEMENTS TO INTERNET ACCESS-CONTROL SECURITY SCHEME
    POON, FSF
    ERTAUL, L
    ENGLISH, MJ
    [J]. ELECTRONICS LETTERS, 1992, 28 (13) : 1250 - 1251
  • [42] ON THE ACCESS-CONTROL MECHANISM OF THE PROGRAM COMPONENT MANAGER
    SILBERSCHATZ, A
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1981, 11 (02): : 159 - 166
  • [43] ACCESS-CONTROL AT THE NETHERLANDS POSTAL AND TELECOMMUNICATIONS SERVICES
    HAEMERS, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 543 - 544
  • [44] LedgerView: Access-Control Views on Hyperledger Fabric
    Ruan, Pingcheng
    Kanza, Yaron
    Ooi, Beng Chin
    Srivastava, Divesh
    [J]. PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (SIGMOD '22), 2022, : 2218 - 2231
  • [45] Real Life Challenges in Access-control Management
    Bauer, Lujo
    Cranor, Lorrie Faith
    Reeder, Robert W.
    Reiter, Michael K.
    Vaniea, Karni
    [J]. CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 899 - 908
  • [46] ACCESS-CONTROL BY MEANS OF AUTOMATIC SPEAKER VERIFICATION
    KUHN, MH
    [J]. JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1980, 13 (01): : 85 - 86
  • [47] ON THE STATIC ACCESS-CONTROL MECHANISM IN CONCURRENT PASCAL
    KIEBURTZ, R
    SILBERSCHATZ, A
    [J]. COMPUTER JOURNAL, 1982, 25 (01): : 17 - 21
  • [48] DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS
    BORN, E
    STIEGLER, H
    [J]. COMPUTERS & SECURITY, 1994, 13 (05) : 437 - 450
  • [49] An access-control framework for WS-BPEL
    Paci, Federica
    Bertino, Elisa
    Crampton, Jason
    [J]. INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2008, 5 (03) : 20 - 43
  • [50] LATTICE-BASED ACCESS-CONTROL MODELS
    SANDHU, RS
    [J]. COMPUTER, 1993, 26 (11) : 9 - 19