Proceedings of the 14th ACM Symposium on Access Control Models and Technologies 2009
DOI: 10.1145/1542207.1542217
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic mandatory access control for multiple stakeholders

Abstract: In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous environment, many devices run software whose access permissions depends on multiple stakeholders, such as the device owner, the service provider, the application owner, etc., rather than a single system administrator. However, current access control administration remains as either discretionary, allowing the running and perhaps comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2009
2009
2016
2016

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 5 publications
(5 reference statements)
0
6
0
2
Order By: Relevance
“…Muthukumaran et al [15] applied SELinux security policies to Openmoko to ensure the integrity of the phone and trusted applications. In a related work, Rao et al [16] developed a mandatory access control (MAC) system for smartphones which uses input from multiple stakeholders to dynamically create the policies run-time permission assignment. The Windows Mobile .NET compact framework uses security-by-contract [17] that binds each application to a behavioral profile enforced at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Muthukumaran et al [15] applied SELinux security policies to Openmoko to ensure the integrity of the phone and trusted applications. In a related work, Rao et al [16] developed a mandatory access control (MAC) system for smartphones which uses input from multiple stakeholders to dynamically create the policies run-time permission assignment. The Windows Mobile .NET compact framework uses security-by-contract [17] that binds each application to a behavioral profile enforced at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…The work further shows how unique features of mobile devices can be leveraged to identify the borderline between trusted/untrusted domains and to simplify the policy specification, while maintaining a high level of platform integrity. The authors of [35] show how policies in the context of multiple mobile platform stakeholders can be created dynamically and present a prototype based on SELinux. Low-level mandatory access control is an essential building block in our design (see Section 4).…”
Section: Kernel-level Mandatory Access Controlmentioning
confidence: 99%
“…Android, for instance, implements currently a quadruplepolicy approach consisting of Permissions, SE Android type enforcement, AppOps, and Linux capabilities-each being responsible for a different aspect of the overall access control strategy. Multiple policies will naturally conflict and thus require the security framework to support different policy composition and reconciliation strategies (e.g., consensus or priority based) [32,27]. However, supporting fully generic policy composition is quite a challenge and has been shown to be intractable [18].…”
Section: Stackable and Dynamic Loadable Modulesmentioning
confidence: 99%