期刊文献+

A Logic-Based Safety Analysis Algorithm for Discretionary Access Control

A Logic-Based Safety Analysis Algorithm for Discretionary Access Control
原文传递
导出
摘要 For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system states and state transfer rules.A general program based on this logic method is proposed for DAC safety analysis,but this program may never be terminal for some safety analysis goal.The safety analysis algorithm is achieved by simplifying the general program according to the property of the DAC model state transfer rules.This safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies for right transferring,and the policies for right permitting,respectively. For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system states and state transfer rules.A general program based on this logic method is proposed for DAC safety analysis,but this program may never be terminal for some safety analysis goal.The safety analysis algorithm is achieved by simplifying the general program according to the property of the DAC model state transfer rules.This safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies for right transferring,and the policies for right permitting,respectively.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期531-538,共8页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) (2007AA01Z471)
关键词 discretionary access control(DAC) safety analysis LOGIC state transfer discretionary access control(DAC) safety analysis logic state transfer
  • 相关文献

参考文献16

  • 1Harrison M, Ruzzo W, Ullman J. Protection in operating systems [J]. Communications of ACM, 1976, 19(8): 461-471.
  • 2Lipton R, Snyder L. A linear time algorithm for deciding subject security [J]. Journal of the ACM, 1977, 24(3): 455-464.
  • 3Sandhu R. The schematic protection model: Its definition and analysis for acyclic attenuating schemes [J]. Journal of ACM, 1988, 35(2): 404-432.
  • 4Sandhu R. The typed access matrix model [C]//Proc of 1992 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1992: 122-136.
  • 5Li N, Tripunitara M. Security analysis in role based access control [C]//Proc of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004). New York: ACM Press, 2004: 126-135.
  • 6Munawer Q, Sandhu R. Simulation of the augmented typed access matrix model (ATAM) using roles [EB/OL]. [2011-09-26]. http ://citeseerx. ist.psu, edu/viewdoc/download? doi= 10. 1.1.91. 612&rep=repl&type=pdf.
  • 7杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 8Sasturkar A, Yang P, Stoller S. Policy analysis for administrative role based access control [C]//Proc of 19th IEEE Workshop on Computer Security Foundations. New York: IEEE Press, 2006: 183-196.
  • 9刘强,姜云飞,饶东宁.基于Graphplan的ARBAC策略安全分析方法[J].计算机学报,2009,32(5):910-921. 被引量:9
  • 10Jiang Yixin, Lin Chuang, Yin Hao, et al. Zhangxi T. Security analysis of mandatory access control model [C]//Proc of 2004 IEEE International Conference on Systems, Man and Cybernetics. New York: IEEE Press, 2004:5013-5018.

二级参考文献24

  • 1杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 2Ferraiolo David, Kuhn Richard. Role-based access controls//Proceedings of the 15th NIST-NCSC National Computer Security Conference. Baltimore, MD, 1992:554-563
  • 3Sandhu R, Coyne E J, Feinstein H L et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38-47
  • 4Sandhu Ravi, Bhamidipati Venkata, Munawer Qamar. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 1999, 2(1):105-135
  • 5Harrison M A, Ruzzo W L, Ullman J D. Protection in operating systems. Communications of the ACM, 1976, 19(8): 461-471
  • 6Li N H, Winsborough W H, Mitchell J C. Beyond proof-of- compliance: Safety and availability analysis in trust management//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, 2003:123-139
  • 7Li N H, Tripunitara M V. Security analysis in role-based access control//Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004). New York, 2004:126-135
  • 8Munawer Q, Sandhu R. Simulation of the augmented typed access matrix model (ATAM) using roles//Proceedings of the International Conference on Information and Security. Shanghai, China, 1999
  • 9Sasturkar A, Yang Ping, Stoller S D et al. Policy analysis for administrative role based access control//Proceedings of the 19th IEEE Workshop on Computer Security Foundations. Venice, Italy, 2006: 183-196
  • 10Lifschitz E. On the semantics of STRIPS//Proceedings of the Reasoning about Actions and Plans. Timberline, Oregon, 1987:1-9

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部