Skip to main content

A dynamically typed access control model

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Abstract

This paper presents the Dynamically Typed Access Control (DTAC) model for achieving secure access control in a highly dynamic environment. It simplifies the access control matrix model of Harrison, Ruzzo and Ullman by dropping the distinction between subjects and objects. It adds dynamic typing to cater for environments in which both rights and types can change. Its resulting flexibility means that it can be used to construct other security models, such as role-based access control or lattice based hierarchical models. The paper presents a formal definition of the DTAC model. A novel feature is that, instead of attempting to prove safety per se, we outline a technique to dynamically maintain a safety invariant. This is important because the run-time checks for the invariant are tractable, whereas equivalent static proofs would be intractable.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. E. Boebert and R. Y. Kain. A Practical Alternative to Hierarchical Integrity Policies. In Proceedings of the 8th National Computer Security Conference, Gaithersburg, Maryland, 1985.

    Google Scholar 

  2. D Bell and L LaPadula. Secure Computer Systems: Mathematical Foundations (Volume 1). Technical Report ESD-TR-73-278, Mitre Corporation, 1973.

    Google Scholar 

  3. James Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Addison-Wesley, Menlo Park, California, August 1996.

    Google Scholar 

  4. A Goldberg. Smalltalk-80: The Interactive Programming Environment. Addison-Wesley, Wokingham, England, 1984.

    Google Scholar 

  5. Michael A Harrison, Walter L Ruzzo, and Jeffrey D Ullman. Protection in operating systems. Communications of the ACM, 19(8), August 1976.

    Google Scholar 

  6. B. W. Lampson. Protection. In Proceedings Fifth Princeton Symposium on Information Sciences and Systems, March 1971. reprinted in Operating Systems Review, 8, 1, January 1974, pages 18–24.

    Google Scholar 

  7. Ravi S Sandhu. The Typed Access Matrix Model. In IEEE Symposium on Security and Privacy, May 1992.

    Google Scholar 

  8. Ravi S Sandhu and Srinivas Ganta. On testing for absence of rights in access control models. In Proceeding of the IEEE Computer Security Foundation Workshop, June 1993.

    Google Scholar 

  9. Jonathon Tidswell and John Potter. An Approach to Dynamic Domain and Type Enforcement. In Proceedings of the Second Australasian Conference on Information Security and Privacy, July 1997.

    Google Scholar 

  10. Jonathon Tidswell and John Potter. Domain and Type Enforcement in a Μ-Kernel. In Proceedings of the 20th Australasian Computer Science Conference, February 1997.

    Google Scholar 

  11. Niklaus Wirth and Jürg Gutknecht. Project Oberon. Addison-Wesley, Wokingham, England, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tidswell, J.E., Potter, J.M. (1998). A dynamically typed access control model. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053743

Download citation

  • DOI: https://doi.org/10.1007/BFb0053743

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics