A type system for Discretionary Access Control
نویسندگان
چکیده
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on the selective distribution of capabilities to selected classes of principals. We study a type-based theory of DAC models for a process calculus that extends Cardelli, Ghelli and Gordon’s pi-calculus with groups (Cardelli et al., 2005). In our theory, groups play the rôle of principals, the unit of abstraction for our access control policies, and types allow the specification of fine-grained access control policies to govern the transmission of names, to bound the (iterated) re-transmission of capabilities, to predicate their use on the inability to pass them to third parties. The type system relies on subtyping to achieve a selective distribution of capabilities, based on the groups that control the communication channels. We show that the typing and subtyping relationships of the calculus are decidable. We also prove a type safety result, showing that in well-typed processes (i) all names flow according to the access control policy specified by their types, and (ii) are received at the intended sites with the intended capabilities. We illustrate the expressive power and the flexibility of the typing system on several examples.
منابع مشابه
Host Integrity Protection Through Usable Non-discretionary Access Control
Existing non-discretionary access control systems (such as Security Enhanced Linux) are difficult to use by ordinary users. We identify several principles for designing usable access control system and introduce the Host Integrity Protection Policy (HIPP) model that adds usable non-discretionary access control to operating systems. The HIPP model is designed to defend against attacks targeting ...
متن کاملType Based Discretionary Access Control
Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of principals. We study a type-based theory of DAC models for concurrent and distributed systems represented as terms of Cardelli, Ghelli and Gordon’s pi calculus with groups [3]. In our theory, groups play the rôle of principals,...
متن کاملRole-Based Access Control
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
متن کاملA Survey of Access Control Policies
Modern operating systems each have different implementations of access controls and use different policies for determining the access that subjects may have on objects. This paper reviews the three main types of access control policies: discretionary, mandatory, and role-based. It then describes how Windows and various Unix systems implement their chosen access control policies. Finally, it dis...
متن کاملRole-Based Access Controls
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Mathematical Structures in Computer Science
دوره 19 شماره
صفحات -
تاریخ انتشار 2009