DISCRETIONARY ACCESS-CONTROL BY MEANS OF USAGE CONDITIONS

被引:1
|
作者
BORN, E
STIEGLER, H
机构
[1] Siemens Nixdorf Informationssysteme AG, D-81739 München
关键词
ACCESS CONTROL INFORMATION; ACCESS RELATION ATTRIBUTES; DISCRETIONARY ACCESS CONTROL; PERMISSION SETS; USAGE CONDITIONS; USER INTERFACE;
D O I
10.1016/0167-4048(94)90037-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A data processing environment allows users to create data objects of very different types. As a part of the management of these objects, the data processing system must support user-defined access control. In this paper we propose a general concept and user interface for user-defined access control and discuss a number of applications. The concept regards access control information as valuable information in its own right and consequently places this information, nowadays mostly specified within and as an integral part of meta-information either of objects or subjects, in objects of its own, called usage conditions. Each of these objects contains access control information corresponding to a task of the real world and formulated with general attributes. Access control for an object is implemented by references to appropriate usage conditions. Access to the object is granted if granted by at least one usage condition. Thus, by setting such references in an m-to-n manner, a restricted set of usage conditions is sufficient to implement even complex access control conditions.
引用
收藏
页码:437 / 450
页数:14
相关论文
共 50 条
  • [31] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [32] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [33] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [34] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [35] ACCESS-CONTROL AND MANAGEMENT IN MULTILEVEL DATABASE MODELS
    BUSSOLATI, U
    MARTELLA, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1981, 123 : 225 - 235
  • [36] CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL
    SANDHU, RS
    INFORMATION PROCESSING LETTERS, 1988, 27 (02) : 95 - 98
  • [37] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292
  • [38] A type system for Discretionary Access Control
    Bugliesi, Michele
    Colazzo, Dario
    Crafa, Silvia
    Macedonio, Damiano
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2009, 19 (04) : 839 - 875
  • [39] Type based discretionary access control
    Bugliesi, M
    Colazzo, D
    Crafa, S
    CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239
  • [40] Effective visualization of file system access-control
    Heitzmann, Alexander
    Palazzi, Bernardo
    Papamanthou, Charalampos
    Tamassia, Roberto
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 18 - 25