Title
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems
Abstract
The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.
Year
DOI
Venue
2005
10.1093/ietisy/e88-d.3.619
IEICE Transactions
Keywords
Field
DocType
procedural constraints,access control judge,extended concept,analysis results. key words: trusted operating system,trusted operating systems,current scheme,extended role,reference monitor,negative procedural constraint,access control,rbac,procedural constraint,immediate information,security kernel,access control system,secure operating system,associate information,discriminate attack trial,specification,operating system,role based access control,control system
Trusted operating system,Security kernel,Principle of legality,Computer science,Computer security,Role-based access control,Access control,Reference monitor,Control system,Operating system
Journal
Volume
Issue
ISSN
E88-D
3
1745-1361
Citations 
PageRank 
References 
3
0.41
15
Authors
3
Name
Order
Citations
PageRank
Wook Shin112016.72
Jong-Youl Park2102.65
Dongik Lee37714.46