Skip to main content

Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems

  • Chapter
Advanced Computer Systems

Part of the book series: The Springer International Series in Engineering and Computer Science ((SECS,volume 664))

  • 171 Accesses

Abstract

The paper presents a new approach to building the access control systems, which allows eliminating the access matrix control (ACL) and defining the local, decentralized access policy. This approach leads to the decentralization of the access control system both in case of DAC and MAC access policies. However there is a need to introduce: (1) new data structures such as attribute certificates AC (privileges certificates), use-condition certificates UCC instead of centralized rules of the access policy, capability certificates (CC), which secure state of the access control system is dependent on, and (2) the partition of the supervisory and control system into separated protection domains. Considering the distribution of the certificates, related to the access control system, they ought to be delivered to the reference monitor in a proper way, and applied to the subject request authorization. The protection domain structure is also specified. This structure models the trust relations between users (subjects) of the system and protected domains. The security theorem, which is formulated in the paper, specifies the necessary conditions for a distributed supervisory and control system to be secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bell D.E., L.J. LaPadula Secure computer systems: mathematical foundations, ESD-TR-73-278, vol. 1-2, ESD/AFSC, Hanscom AFB, Bedford, MA, November 1973 (MTR-2547, vol. 1-2, MITRE Corp., Bedford, MA)

    Google Scholar 

  2. Bell D.E., L.J. LaPadula Secure computer systems: a refinement of the mathematical model, Technical Report ESD-TR-73-278, vol.3, ESD/AFSC, Hanscom AFB, Bedford, MA, April 1974 (MTR-2547, vol.3, MITRE Corp., Bedford, MA)

    Google Scholar 

  3. Bell D.E., L.J. LaPadula Secure computer systems: mathematical foundations and model, Technical Report M74-244, The MITRE Corp., Bedford, MA, 1974

    Google Scholar 

  4. Bell D.E., L.J. LaPadula Secure computer systems: unified exposition and Multics interpretation, The MITRE Corp., Bedford, MA, 1975

    Google Scholar 

  5. E. Bertino, E. Ferrari, F. Buccafurri, P. Rullo A Logical Framework for Reasoning on Data Access Control Policies, Proceeding of the 12th IEEE Computer Security Workshop, IEEE Computer Society Press, July 1999

    Google Scholar 

  6. K.J. Biba Integrity considerations for secure computer systems, ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, MA, April 1977 (MTR-3153, MITRE Corp., Bedford, MA)

    Google Scholar 

  7. M. Blaze, J. Feigenbaum, J. Lacy Decetralized Trust Management, in Proc.1996 IEEE Synposium on Security and Privacy, pp.164–173, Oakland, CA, May 1996, IEEE Computer Society Press

    Google Scholar 

  8. M. Blaze, J. Feigenbaum, J. Ioannidis „A.D. Keromytis The Role of Trust Management in Distributed Systems Security, in Secure Internet Pogramming: Security Issues for Mobile and Distributed Objects, ed. Jan Vitek and Ch. Jensen, Springer-Verlag Inc, New York

    Google Scholar 

  9. S. Castano, M.G. Fugini, G. Martella, P. Samarati Database security, Addison-Wesley Publishing Company, New York 1994.

    Google Scholar 

  10. C. Ellison, B. Frantz, B. Lampson„ R. Rivest, B.M. Thomas, T. Ylonen SPKI Certificate Theory, Network Working Group, RFC 2693, September 1993

    Google Scholar 

  11. S. Farrell, R. Housley — Internet X. 509 Public Key Infrastructure — An Internet Attribute Certificate Profile for Authorization, PKIX Working Group, Internet Draft, May 2000, <http://www. ietf.org/internet-drafts/draft-ietf-pkix-ac509prof-06. txt>

    Google Scholar 

  12. W. Johnston, S. Mudumbai, M. Thompson Authorization and Attribute Certificates for Widely Distributed Access Control, IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE ‘98

    Google Scholar 

  13. W. E. Kuhnhauser Paradigm for User-Defined security Policies, Proceedings of 14th IEEE Symposium on Reliable Distributed Systems, 1995, IEEE Press

    Google Scholar 

  14. W. E. Kuhnhauser, M. Von Kopp Ostrowski A Formal Framework to Support Multiple Security Policies, Proceedings of 7th Canadian Computer Security Symposium, Ottawa, Canada, May 1995

    Google Scholar 

  15. J. McLean Security models, in Encyclopedia of Software Engineering, ed. J. Marciniak, Weley Press, 1994

    Google Scholar 

  16. J. Pejaƛ, W. Chocianowicz Model of Multilevel Infromation Security for Distributed Supervisory and Control Systems, Third National Scientifically-Technical Conference on Diagnostics of Industrial Processes, September 7-10, 1998 r, Jurata k/GdaƄska

    Google Scholar 

  17. J. Pejaƛ, W. Chocianowicz The Role of the Trusted Third Party in Management of Cryptographic Keys Containers for Distributed Supervisory and Control Systems (in polish), Fourth Third National Scientifically-Technical Conference on Diagnostics of Industrial Processes, September 13-16, 1999, Kazimierz Dolny

    Google Scholar 

  18. T.Y.C. Woo, S.S. Lam Authorization in Distributed Systems: A New Approach, Journal of Computer Security, 2, pp. 107–136,1993

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jerzy SoƂdek Jerzy Pejaƛ

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Pejaƛ, J. (2002). Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems. In: SoƂdek, J., Pejaƛ, J. (eds) Advanced Computer Systems. The Springer International Series in Engineering and Computer Science, vol 664. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8530-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-8530-9_30

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4635-7

  • Online ISBN: 978-1-4419-8530-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics