2006
DOI: 10.1007/11863908_17
|View full text |Cite
|
Sign up to set email alerts
|

HBAC: A Model for History-Based Access Control and Its Model Checking

Abstract: Stack inspection is now broadly used as dynamic access control infrastructure in such runtime environments as Java virtual machines and Common Language Runtime. However, stack inspection is not sufficient for security assurance since the stack does not retain security information on the invoked methods for which execution is finished. To solve this problem, access control models based on execution history have been proposed. This paper presents a formal model for programs with access control based on execution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Below we informally describe the HBAC [1,26], the access control mechanism assumed in this paper. (Formal definition is given in Section 2.3.)…”
Section: Access Control Mechanismmentioning
confidence: 99%
See 2 more Smart Citations
“…Below we informally describe the HBAC [1,26], the access control mechanism assumed in this paper. (Formal definition is given in Section 2.3.)…”
Section: Access Control Mechanismmentioning
confidence: 99%
“…(Formal definition is given in Section 2.3.) HBAC is proposed to resolve the weakness of the stack inspection such that it ignores the execution history of functions of which execution is finished [1,4,26]. (See [1] for the design principles of HBAC.)…”
Section: Access Control Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…a policy requiring that no socket connections can be opened after a local file has been read. Wang, Takata and Seki [37] propose a model for history-based access control. They use control-flow graphs enriched with permissions and a primitive to check them, similarly to [5].…”
Section: Static Analysis and Optimizationsmentioning
confidence: 99%
“…The model-checking technique can decide if all the permitted traces of the graph respect a given regular property on its nodes. Unlike our local policies, that can enforce any regular policy on traces, the technique of [37] is less general, because there is no way to enforce a policy unless it is encoded as a suitable assignment of permissions to nodes. Pandey and Hashii [33] enhance the access control model of Java, by specifying fine-grained constraints on the execution of mobile code.…”
Section: Static Analysis and Optimizationsmentioning
confidence: 99%