A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment
نویسندگان
چکیده
The research communitiy has shown considerable interest in studying access control in single Trusted Operating Systems (TOS). However, interactions among multiple TOSs have attracted relatively little attention. In this paper, we propose a Collaborative Role-Based Access Control (C-RBAC) model for distributed systems in which accesses across system domain boundaries are allowed. Access entities in a TOS vary in time. The changes in the organizational structure of the access entities in one system may influence other cooperating systems. In addition, policyfreeness, domain and rule conflicts are possible. These problems restrict the flexibility and scalability of coordination. We propose drafting a metacomponent to play the role of a coordinator in multi-domain role-based access control. It is then possible to impart flexibility and scalability in a secure fashion. Experimental studies of the proposed model with the Network File System and SELinux system support our conclusion. key words: role based access control, multi-domain security, trusted operating systems, distributed systems security
منابع مشابه
Trusted Database Interoperation Based on Collaborative Role-Based Access Control
The increasing development of distributed application has led to the widespread involvement of database interconnection. Information sharing through the interconnection requires a new type of access control beyond local-only access control scheme: we need to consider the relationship among organizations and a collaborative application. In this paper, we describe an access control framework for ...
متن کاملExtended Role Based Access Control with Procedural Constraints for Trusted Operating Systems
The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refu...
متن کاملA Simple Implementation and Performance Evaluation Extended-Role Based Access Control
This paper addresses the complexity issues of extended-role based access control (E-RBAC) implemented under an embedded environment. Although E-RBAC can provide more trusted environment than the traditional trusted operating systems by prohibiting the attacks consisting of ordinary operations, it is expected that its implementation has performance overhead due to the procedural constraints of E...
متن کاملSmall TCBs of policy-controlled operating systems
IT systems with advanced security requirements increasingly apply problem-specific security policies for describing, analyzing, and implementing security properties. Security policies are a vital part of a system’s trusted computing base (TCB). Hence, both correctness and tamper-proofness of a TCB’s implementation are essential for establishing, preserving, and guaranteeing a system’s security ...
متن کاملAn Extension of Role Based Access Control for Trusted Operating Systems and Its Coloured Petri Net Model
The notion of trusted operating system was proposed to solve the security problems of current security solutions. Such security solutions as intrusion detection systems, firewalls have been used widely. However, they are run in the application-level of computer systems. Therefore many application-level processes including hacking programs can easily bypass them. Numerous bypassing techniques al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 88-A شماره
صفحات -
تاریخ انتشار 2005