Abstract
The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the limitation, access control systems do not efficiently limit attacks consist of allowed operations. For trusted operating system developments, we extended RBAC and added procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. Also, extended RBAC keeps the principle of least privilege and separation of duty more precisely. This paper shows the specification of the extended concept and model, and presents simple analysis results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, Department of Defense Standard(DOD 5200.28-STD), Library Number S225, 711 (1985)
Gollmann, D.: Computer Security. John Wiley & Sons, Chichester (1999)
Amoroso, E.G.: Fundamentals of Computer Security Technology. AT&T Bell Laboratories, Prentice Hall PTR, Englewood Cliffs (1994)
Cray Research, UNICOS Multilevel Security (MLS) Feature User’s Guide, SG- 2111 10.0, Cray Research, Inc. (1990)
Branstad, M., Tajalli, H., Mayer, F.: Security issues of the Trusted Mach system. In: Proc. of 4th Aerospace Computer Security Applications Conference, pp. 362–367 (1998)
Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX 2001) (2001)
Ott, A.: The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension. In: 8th Int. Linux Kongress, Enschede (2001)
Trusted Solaris, http://wwws.sun.com/software/solaris/trustedsolaris/index.html
Ptacek, T., Newsham, T.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection (1998)
Baker, D.: Fortresses built upon sand. In: Proceedings of the New Security Paradigms Workshop (1996)
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) (1996)
Ferraiolo, D., Barkely, J.F., Kuhn, D.R.: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security 1(2) (1999)
Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role Based Access Control: Features and Motivations. In: Proc. of Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos (1995)
Barkley, J.F., Cincotta, V., Ferraiolo, D.F., Garrvrilla, S., Kuhn, D.R.: Role Based Access Control for the World Wide Web. In: NIST 20th National Computer Security Conference (1997)
Moffett, J.D.: Control Pinciples and Role Hierarchies. In: 3rd ACM Workshop on Role Based Access Control (RBAC), October 1998, pp. 22–23 (1998)
Koch, M., Mancini, L.V., Presicce, F.P.: A Graph-Based Formalism for RBAC. ACM Trancsactions on Information and System Security 5(3), 332–365 (2002)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security 4(3) (2001)
Bishop, M., Dilger, M.: Checking for Race Conditions in File Access. Computing Systems 2, 131–152 (1996)
[8lgm]-Advisory-20. UNIX.SunOS-sendmailV5.1 (August 1995), README
ITU-T SG/7 & Working Parties: Final text for recommendation X.812 Information Technology-Open Systems interconnection Security framework for open systems: Access control framework (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shin, W., Lee, DI., Kim, HC., Kang, JM., Lee, JS. (2004). Extended Role Based Access Control and Procedural Restrictions. In: Lim, JI., Lee, DH. (eds) Information Security and Cryptology - ICISC 2003. ICISC 2003. Lecture Notes in Computer Science, vol 2971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24691-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-24691-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21376-5
Online ISBN: 978-3-540-24691-6
eBook Packages: Springer Book Archive