Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems(Application Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.
- 2005-03-01
著者
-
Lee Dong
The Authors Are With The Department Of Information And Communications Kwang-ju Institute Of Science
-
Shin Wook
The Authors Are With The Department Of Information And Communications Kwang-ju Institute Of Science
-
Park Jong
The Authors Are With The Department Of Electrical Engineering
-
Park J‐y
The Authors Are With The Department Of Information And Communications Kwang-ju Institute Of Science
-
LEE Dong
the Attached Institute of Electronics and Telecommunications Research Institute (ETRI)
関連論文
- Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems(Application Information Security)
- Turbo Equalization for Wireless Cellular Systems (Special Section of Papers Selected from ITC-CSCC'99)
- Cryptanalysis of INCrypt32 in HID's iCLASS Systems