Selective and locally controlled transport of privileges
- 1 October 1984
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Programming Languages and Systems
- Vol. 6 (4) , 573-602
- https://doi.org/10.1145/1780.1786
Abstract
In a system based on authorization, the ability of a subject to operate on the system is a function of the privileges that he possesses. In this paper a mechanism, called Send-Receive, for the transport of such privileges, is introduced and studied. The control provided by this mechanism over the movement of privileges has two notable properties. --The control is selective, in the sense that it permits the creation of transport channels, which allow for the movement of only certain types of privileges and only between certain kinds of subjects. --The control is local, in the sense that every movement of privileges into and out of the domain of a given subject must be authorized by privileges already in his domain. The proposed transport mechanism is shown to allow the imposition of a local upper bound on the power of any given subject. This bound is independent of the rest of the system and can, therefore, be viewed as an intrinsic property of the subject. The ability to impose such bounds is considered essential for effective modularization of computer systems. In addition, the locality of our control has beneficial global effects on the flow of privileges. In particular, it helps remove the undesirable symmetry of transport, exhibited by the conventional Take-Grant mechanism.Keywords
This publication has 8 references indexed in Scilit:
- The Darwin software-evolution environmentPublished by Association for Computing Machinery (ACM) ,1984
- Locality in software systemsPublished by Association for Computing Machinery (ACM) ,1983
- Unidirectional Transport of Rights and Take–Grant ControlIEEE Transactions on Software Engineering, 1982
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- A Linear time algorithm for deciding securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1976
- An authorization mechanism for a relational database systemACM Transactions on Database Systems, 1976
- Protection in operating systemsCommunications of the ACM, 1976
- The protection of information in computer systemsProceedings of the IEEE, 1975