A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo (Dept. of Information Communication, Hansei University)
  • Published : 1997.12.01

Abstract

A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

Keywords

References

  1. CCITT, Data communication Networks Message Handing Systems, Recommendations X.400 - X.420
  2. ISO/IEC, Information Processing System - Open Systems Inerconnection - Basic Reference Model - Part 2 Security Architecture
  3. ISO/IEC, Information Technology - Open Systems Inerconnection - Security Frameworks in Open Systems - Part 3 Access Control
  4. NCSC-TG-005, Version 1 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Department of Defence Computer Security Center
  5. Technical Reprot ESD-TR-75-306 Secure : Unified Exposition and Multics Interpretation D.E.Bell;L.J.LaPadula
  6. Technical Roport ESD-TR-76-372 Inergrity Consideration for Secure Computer Systems K.J.Biba
  7. ACM Trans. on Computer Systems v.2 no.3 A Security Model for Military Message Systems j.Landwehr;C.Heitmeyer;J.Mclean
  8. Proceeding of the Computer Security Foundation Workshop III Formal Policies for Trusted Processes J.Landauer;T.Redmond;T.Benzel
  9. Proceeding of the first Conference on Computer and Communication Security High Assurance Discretionary Access Control for Object Bases E.Bertinto;Sanmarati,P.;Jajodia,S.
  10. Proceeding of the Computer Security Foundation Workshop III Formal Modeling in a Generalized Framework for Access Control L.J.LaPaula
  11. Proceeding of the 1987 Symposium on Secu rity and Privacy Exploting the Deal Nature of Sensitivity Labels J.P.L.Woodward
  12. Proceeding of the 13th National Computer Security Conference A Generalized Framework for Access Control : An Informal Description M.D.Abrams;K.W.Eggers;L.J.LaPadula
  13. Proceeding of the 15th National Computer Security Conference Role-Based Access Control Models D.Ferrario;R.Kahn