A Synchronization Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the Role-Based Access Control Model
S Hayashi, S Nakamura, D Duolikun, T Enokido… - … on Broadband and …, 2018 - Springer
S Hayashi, S Nakamura, D Duolikun, T Enokido, M Takizawa
International Conference on Broadband and Wireless Computing, Communication …, 2018•SpringerIn access control models, a transaction is allowed to read and write an object only if access
rights to read and write the object are granted, respectively. Suppose a transaction T_1
reads data d from a file object f_1 and then writes the data d to another file object f_2. Here,
another transaction T_2 can get the data d by reading the file object f_2 even if T_2 is not
granted a read right on the file object f_1. Here, information in the file object f_1 flows to the
transaction T_2 via the file object f_2. We have to prevent illegal information flow to occur by …
rights to read and write the object are granted, respectively. Suppose a transaction T_1
reads data d from a file object f_1 and then writes the data d to another file object f_2. Here,
another transaction T_2 can get the data d by reading the file object f_2 even if T_2 is not
granted a read right on the file object f_1. Here, information in the file object f_1 flows to the
transaction T_2 via the file object f_2. We have to prevent illegal information flow to occur by …
Abstract
In access control models, a transaction is allowed to read and write an object only if access rights to read and write the object are granted, respectively. Suppose a transaction reads data d from a file object and then writes the data d to another file object . Here, another transaction can get the data d by reading the file object even if is not granted a read right on the file object . Here, information in the file object flows to the transaction via the file object . We have to prevent illegal information flow to occur by transactions manipulating objects. The role-based access control (RBAC) model is widely used in various applications like database systems. In our previous studies, the legally precedent relation from a role to a role is defined. However, even if the legal condition is satisfied, there is case illegal information flow occurs. In this paper, we redefine legal and illegal precedent relations among roles. In order to check if a collection A of roles illegally precedes a collection B of roles, we introduce a new condition which uses maximal roles of A and B.
Springer
Showing the best result for this search. See all results