Transformation of access rights
- 7 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The author introduces the concept of transformation of access rights to unify a variety of access-control mechanisms. These mechanisms have mostly been proposed independently of each other to deal with various integrity issues. Their common foundation is abstracted in a model called transform. The formalization makes it possible to investigate the minimal features required to support transform. The relation of transform to existing access-control models is then considered. It is shown that the access-matrix model transform is outside the class of systems for which safety is known to be decidable. On the other hand it is shown that transform is an instance of the decidable cases of the schematic protection model.Keywords
This publication has 15 references indexed in Scilit:
- The schematic protection modelJournal of the ACM, 1988
- The source of authority for commercial access controlComputer, 1988
- Some Owner Based Schemes With Dynamic Groups In The Schematic Protection ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- Selective and locally controlled transport of privilegesACM Transactions on Programming Languages and Systems, 1984
- Unidirectional Transport of Rights and Take–Grant ControlIEEE Transactions on Software Engineering, 1982
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- Protection in operating systemsCommunications of the ACM, 1976
- Protection in the Hydra Operating SystemPublished by Association for Computing Machinery (ACM) ,1975
- The protection of information in computer systemsProceedings of the IEEE, 1975
- Programming semantics for multiprogrammed computationsCommunications of the ACM, 1966