IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
DOI: 10.1109/secpri.2004.1301315
|View full text |Cite
|
Sign up to set email alerts
|

A layered design of discretionary access controls with decidable safety properties

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
0

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(42 citation statements)
references
References 20 publications
1
41
0
Order By: Relevance
“…These models all have subcases where safety is decidable. Solworth and Sloan [44] introduced discretionary access control model in which safety is decidable. This thread of research has proposed many new access control schemes, but has had limited impact on access control systems used in practice.…”
Section: Related Workmentioning
confidence: 99%
“…These models all have subcases where safety is decidable. Solworth and Sloan [44] introduced discretionary access control model in which safety is decidable. This thread of research has proposed many new access control schemes, but has had limited impact on access control systems used in practice.…”
Section: Related Workmentioning
confidence: 99%
“…These models all have subcases where safety is decidable. Solworth and Sloan [42] introduced a discretionary access control model in which safety is decidable. This thread of research has produced many new access control schemes but has had limited impact on access control systems used in practice, probably because the proposed schemes are either too simplistic to be useful or too arcane to be usable.…”
Section: Related Workmentioning
confidence: 99%
“…The well-known "HRU model" describes a simple matrix-based access control model, with the surprising property that even if every policy in a system can be efficiently evaluated, security analysis can be undecidable [18]. This is not the case for every access control model; security analyses of some existing access control systems without the same expressiveness as the HRU model can be decidable while still allowing useful policies to be expressed [24,32]. Unfortunately, it is easy to show that the HRU model can be simulated in TD: Theorem 1.…”
Section: Security Analysis and Decidabilitymentioning
confidence: 99%