Tytuł artykułu
Autorzy
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Interconnectivity of computers in network environments increases the risk of security breach in distributed computer systems. In many system architectures security is provided only in application space. This paper proposes an operating system enforced access control policy where Role Based Access Control and Privilege Management Infrastructure(PMI) based on X.509 attribute certificates are integrated into the operating system kernel. The resulting architecture tries to leverage the cost of maintaining the security policy by providing an easy way for managing security role assignments to users of the system.
Czasopismo
Rocznik
Tom
Strony
203--210
Opis fizyczny
Bibliogr. 16 poz., rys.
Twórcy
autor
Bibliografia
- [1] Lampson, B.: Protection. In: Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, Princeton University (1971) 437–443
- [2] Bell, D., La Padula, L.: Secure Computer Systems: Mathematical Foundations (Volume 1). Technical report, ESD-TR-73-278, Mitre Corporation (1973)
- [3] Lipton, R., Snyder, L.: A Linear Time Algorithm for Deciding Subject Security. Journal of the ACM (JACM) 24(3) (1977) 455–464
- [4] Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communications of the ACM 19(8) (1976) 461–471
- [5] Denning, D.: A Lattice Model of Secure Information Flow. Communications (1976)
- [6] Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference. (1992) 554–563
- [7] Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4(3) (2001) 224–274
- [8] Chadwick, D., Otenko, A., Ball, E.: Role-based access control with X. 509 attribute certificates. Internet Computing, IEEE 7(2) (2003) 62–69
- [9] Chadwick, D., Otenko, A.: The PERMIS X. 509 role based privilege management infrastructure. Future Generation Computer Systems 19(2) (2003) 277–289
- [10] Lorch, M., Adams, D., Kafura, D., Koneni, M., Rathi, A., Shah, S.: The PRIMA system for privilege management, authorization and enforcement in grid environments. Grid Computing, 2003. Proceedings. Fourth International Workshop on (2003) 109–116
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e9acc2cc-d02d-4885-8b05-21cf1183acdd