A distributed implementation of the extended schematic protection model
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 152-164
- https://doi.org/10.1109/csac.1991.213009
Abstract
Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.Keywords
This publication has 10 references indexed in Scilit:
- A secure identity-based capability systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Transformation of access rightsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Safety analysis for the extended schematic protection modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Extending the creation operation in the Schematic Protection ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Undecidability of safety for the schematic protection model with cyclic createsJournal of Computer and System Sciences, 1992
- The schematic protection modelJournal of the ACM, 1988
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unidirectional Transport of Rights and Take–Grant ControlIEEE Transactions on Software Engineering, 1982
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- Protection in operating systemsCommunications of the ACM, 1976