{"title":"Providing a flexible security override for trusted systems","authors":"L. Badger","doi":"10.1109/CSFW.1990.128192","DOIUrl":null,"url":null,"abstract":"A definition of security, relaxation security, which is expressed in terms of the guarantees that a trusted system may provide, is presented. Relaxation secure systems permit dynamic, incremental relaxation of security constraints by authorized users. The use of guarantees permits security damage sustained during a period of constraint relaxation to be expressed in terms of guarantees violated; the set of violated guarantees may then be used as input for security recovery. A definition of security using a state machine formulation is presented, the implications of relaxation security for security recovery are discussed, and the utility of the approach is demonstrated using an example application.<<ETX>>","PeriodicalId":185508,"journal":{"name":"[1990] Proceedings. The Computer Security Foundations Workshop III","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Proceedings. The Computer Security Foundations Workshop III","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1990.128192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
A definition of security, relaxation security, which is expressed in terms of the guarantees that a trusted system may provide, is presented. Relaxation secure systems permit dynamic, incremental relaxation of security constraints by authorized users. The use of guarantees permits security damage sustained during a period of constraint relaxation to be expressed in terms of guarantees violated; the set of violated guarantees may then be used as input for security recovery. A definition of security using a state machine formulation is presented, the implications of relaxation security for security recovery are discussed, and the utility of the approach is demonstrated using an example application.<>