Access control by tracking shallow execution history
- 10 June 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10816011,p. 43-55
- https://doi.org/10.1109/secpri.2004.1301314
Abstract
Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor. By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a fine-grained policy classification lays the semantic foundation for future studies on special-purpose policy languages.Keywords
This publication has 20 references indexed in Scilit:
- Computability classes for enforcement mechanismsACM Transactions on Programming Languages and Systems, 2006
- Edit automata: enforcement mechanisms for run-time security policiesInternational Journal of Information Security, 2005
- Stack inspectionACM Transactions on Programming Languages and Systems, 2003
- Runtime verification of authorization hook placement for the linux security modules frameworkPublished by Association for Computing Machinery (ACM) ,2002
- LOMAC: Low Water-Mark integrity protection for COTS environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Termination in language-based systemsACM Transactions on Information and System Security, 2002
- SAFKASIACM Transactions on Software Engineering and Methodology, 2000
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- History-based access control for mobile codePublished by Association for Computing Machinery (ACM) ,1998
- Recognizing safety and livenessDistributed Computing, 1987