2005
DOI: 10.1093/ietisy/e88-d.3.619
|View full text |Cite
|
Sign up to set email alerts
|

Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems

Abstract: The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…We have proposed an extended reference monitor [8,10] with a view to involve the behavioral dimension of security enforcement. Our monitor model attaches a behavior control component to the access control unit thereby providing both access and behavior controls in the system.…”
Section: Our Protection Structure For the Extended Reference Monitormentioning
confidence: 99%
See 2 more Smart Citations
“…We have proposed an extended reference monitor [8,10] with a view to involve the behavioral dimension of security enforcement. Our monitor model attaches a behavior control component to the access control unit thereby providing both access and behavior controls in the system.…”
Section: Our Protection Structure For the Extended Reference Monitormentioning
confidence: 99%
“…In [8], we defined the behavioral control unit as a security automata [14] which can guarantee the safety property which ensures that if a trace is not in accordance with the behavioral policy, then the execution must be terminated at the earliest. We have extended the RBAC model [10] with the procedural restriction; thus, the monitor makes access decisions based on continuous access information in RBAC enabled TOSs.…”
Section: Our Protection Structure For the Extended Reference Monitormentioning
confidence: 99%
See 1 more Smart Citation