l-HE ENFORCEMENT OF SECURin POLICIES FOR COMPUTATION
نویسندگان
چکیده
Security policies define how information within a computer system is to be used. Protection mechanisms are built into these systems to enforce security policies. However, in mort systems it is quite unclear what policies a particular mechanism can or does enforce. This paper prscisely defines security policies and protection mechanisms in order to bridge the gap between them with the concept of soundness: whether a protection mechanism enforces a specific policy for a given program. Different sound protection .nechanlsms for the s,ame policy and program can ther be compared (on the basi^ of comoleteness) to determine if one outperforms the othersr Wa also show that yh^ union A. of mechanisms for the same policy and program car. be taken to produce a more complete mechanism^ Although a maximal mechanism exiats it cannot necessarily be effectively found. In addition LO developing a theoretical framework in which to discuss security jrffc introdtict Äe surveillance protection mechanism awJ shew burli / A that it is sound and that it is more complete than tne commonly used high water mark mechanism.
منابع مشابه
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملModel-driven specification and enforcement of RBAC break-glass policies for process-aware information systems
Context: In many organizational environments critical tasks exist which – in exceptional cases such as an emergency – must be performed by a subject although he/she is usually not authorized to perform these tasks. Break-glass policies have been introduced as a sophisticated exception handling mechanism to resolve such situations. They enable certain subjects to break or override the standard a...
متن کاملPrivacy Enforcement with an Extended Role-Based Access Control Model
Privacy enforcement has been one of the most important challenges in IT area. Current privacy practices within companies and organizations, e.g. enabling a P3P compliant policy, incorporating a privacy seal program, etc., cannot truly protect consumer privacy. Privacy protection can only be achieved by enforcing privacy policies within an organization’s online and offline data processing system...
متن کاملhe Impacts of Bounced Checks on Economic Growth Through the Banking Credit Risk Channel Emphasis on Enforcement of Laws: Provincial Panel Approach
This study investigates the relation between bounced checks and economic growth through the banking credit risk channel by estimation of a simultaneous equation system with panel data for 31 Iranian provinces covers the years from 2011 to 2015. For this purpose, after identifying determinants of the bounced checks, the relations of this variable with the non-performing loans, banking loans and ...
متن کاملA potential role for PTTG/securin in the developing human fetal brain.
Human securin, known also as PTTG, has established oncogenic and cell cycle regulatory functions. PTTG/securin transforms cells in vitro, inhibits sister chromatid separation, and regulates secretion of fibroblast growth factor-2. FGF-2 is a key regulator of CNS development and PTTG/securin expression has been reported in murine fetal brain. We examined the expression and function of securin an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014