Abstract
Trusted virtual machines based on statically configured security models are either too restrictive, or too open an environment for many types of applications. The domain and type enforcement model of mandatory access control is a static approach to security that supports the principle of least privilege. We propose a dynamically configurable variant of domain and type enforcement, in which access control tables are modifiable subject to configuration controls represented in a rule-base. Two benefits accrue from this separation into table-based access control, and rule-based configuration control: simplicity, and efficiency. An example demonstrates the viability of our approach.
Preview
Unable to display preview. Download preview PDF.
References
Badger, L., et al, Practical Domain and Type Enforcement for UNIX In Proc. 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995.
Bai, Y., and V. Varadharajan, A Model Based Semantics for Transformations of Authorization Policies In Proc. 20th Australasian Computer Science Conference, Sydney, Australia, February 1997.
Boebert, W. E. and R. Y. Kain, A Practical Alternative to Hierarchical Integrity Policies In Proc. of 8th National Computer Security Conference, Gaithersburg, MD, 1985. pp 18–27
Borenstein, N. K. EMail With A Mind of Its Own: The Safe-Tel Language for Enabled Mail In Proc. Upper Layer Protocols, Architectures and Applications, 1994.
Clark, D. D., and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies In Proc. 1987 IEEE Symposium on Security and Privacy”, April 1987. pp. 184–194.
Lampson, B. W., Protection In Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, March 1971 pp 437–443, reprinted in Operating Systems Review, 8, 1 January 1974, pp. 18–24.
Sandhu, R. S., A Lattice Interpretation of the Chinese Wall Policy In Proc. 15th NIST-NCSC National Computer Security Conference, 1992. pp 329–339
Sandu, R., and G. S. Suri, Non-Monotonic Transformation of Access Rights In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1992.
Sami Saydjari, O., J. Beckman and J. Leaman, LOCKing Computers Securely In Proc. 10th DoD/NBS Computer Security Conference, Gaithersburg, MD. September 1987. pp 129–140.
Tidswell, J., and Potter, J., Domain and Type Enforcement in a μ,-Kernel In Proceedings 20th Australasian Computer Science Conference, Sydney, Australia, February 1997.
Walker, K. M., et al, Confining Root Programs with Domain and Type Enforcement (DTE) In proc. 1996 Usenix Security Symposium, San Jose, CA.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tidswell, J., Potter, J. (1997). An approach to dynamic domain and type enforcement. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027941
Download citation
DOI: https://doi.org/10.1007/BFb0027941
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive