A Logic of Access Control

نویسندگان

  • Jason Crampton
  • George Loizou
  • Greg O'Shea
چکیده

The e ectiveness of an access control mechanism in implementing a security policy in a centralised operating system is often weakened because of the large number of possible access rights involved, informal speci cation of security policy and a lack of tools for assisting systems administrators. Herein we present a logical foundation for automated tools that assist in determining which access rights should be granted by reasoning about the e ects of an access control mechanism on the computations performed by an operating system. We demonstrate the practicality and utility of our logical approach by showing how it allows us to construct a deductive database capable of answering questions about the security of two real-world operating systems. We illustrate the application of our techniques by presenting the results of an experiment designed to assess how accurately the con guration of an access control mechanism implements a given security policy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A New Implementation of Maximum Power Point Tracking Based on Fuzzy Logic Algorithm for Solar Photovoltaic System

In this paper, we present a modeling and implementation of new control schemes for an isolated photovoltaic (PV) using a fuzzy logic controller (FLC). The PV system is connected to a load through a DC-DC boost converter. The FLC controller provides the appropriate duty cycle (D) to the DC-DC converter for the PV system to generate maximum power. Using FLC controller block in MATLABTM/Simulink e...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Social Logic of Kitchen Space in Vernacular Architecture (Case Study: Qeshm Housing) – Examination and Analysis

Culture and social relations play a significant role in the formation of the structure of vernacular housing of any region, especially in the Islamic countries where privacy has a considerable effect on the vernacular culture, and consequently, on the house’s structure. Among the house spaces, the kitchen is more affected than other spaces by such issues so that its relations pattern with other...

متن کامل

Design and PLC Implementation for Speed Control of DC Motor using Fuzzy Logic

In this article, a speed control of DC motor is designed and illustrated using fuzzy logic-based programmable logic controller (PLC). The DC motor is an attractive part of electrical equipment in many industrial applications requiring variable speed and load specifications due to its ease of controllability. The designed system is consisted of three main parts including programmable logic contr...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Comput. J.

دوره 44  شماره 

صفحات  -

تاریخ انتشار 2001