Jonathon Tidswell, G. Outhred, John Michael Potter
{"title":"Dynamic rights: safe extensible access control","authors":"Jonathon Tidswell, G. Outhred, John Michael Potter","doi":"10.1145/319171.319182","DOIUrl":null,"url":null,"abstract":"Extensible systems such as micro-kernels and component architectures push current security models to the limit. A number of dynamic access control models have been developed but all fail to ensure safety, especially of large scale configurations. In previous work we have developed a dynamic typed access control (DTAC) model that supports generalised security configuration descriptions based on subject and object types. This model includes a security invariant to ensure safety in the presence of change. In this paper we investigate the use of structured subject types, structured object types and structured rights to simplify both modelling and safety enforcement within DTAC. Structuring all aspects of the access control relation is both promising and novel.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Role-Based Access Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/319171.319182","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Extensible systems such as micro-kernels and component architectures push current security models to the limit. A number of dynamic access control models have been developed but all fail to ensure safety, especially of large scale configurations. In previous work we have developed a dynamic typed access control (DTAC) model that supports generalised security configuration descriptions based on subject and object types. This model includes a security invariant to ensure safety in the presence of change. In this paper we investigate the use of structured subject types, structured object types and structured rights to simplify both modelling and safety enforcement within DTAC. Structuring all aspects of the access control relation is both promising and novel.