Modeling Mandatory Access Control in Role-Based Security Systems

  • Nyanchama M
  • Osborn S
N/ACitations
Citations of this article
19Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic de nitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of informa- tion, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information ow among contexts in role-based protection systems. The acyclic information ows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

Cite

CITATION STYLE

APA

Nyanchama, M., & Osborn, S. (1996). Modeling Mandatory Access Control in Role-Based Security Systems (pp. 129–144). https://doi.org/10.1007/978-0-387-34932-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free