Extended role based access control with procedural constraints for trusted operating systems

Wook Shin, Jong Youl Park, Dong Ik Lee

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.

Original languageEnglish
Pages (from-to)619-627
Number of pages9
JournalIEICE Transactions on Information and Systems
VolumeE88-D
Issue number3
DOIs
StatePublished - 2005

Keywords

  • Access control
  • Procedural constraints
  • RBAC
  • Reference monitor
  • Secure operating system
  • Security kernel
  • Trusted operating system

Fingerprint

Dive into the research topics of 'Extended role based access control with procedural constraints for trusted operating systems'. Together they form a unique fingerprint.

Cite this