A distributed implementation of the extended schematic protection model

Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ull...

Full description

Saved in:
Bibliographic Details
Published inComputer Security Applications, 7th Annual Conference pp. 152 - 164
Main Authors Ammann, P., Sandhu, R.S., Suri, G.S.
Format Conference Proceeding
LanguageEnglish
Published IEEE Comput. Soc. Press 1991
Subjects
Online AccessGet full text
ISBN0818622806
9780818622809
DOI10.1109/CSAC.1991.213009

Cover

Loading…
Abstract Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.< >
AbstractList Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.< >
Author Suri, G.S.
Sandhu, R.S.
Ammann, P.
Author_xml – sequence: 1
  givenname: P.
  surname: Ammann
  fullname: Ammann, P.
  organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
– sequence: 2
  givenname: R.S.
  surname: Sandhu
  fullname: Sandhu, R.S.
  organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
– sequence: 3
  givenname: G.S.
  surname: Suri
  fullname: Suri, G.S.
  organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
BookMark eNotj01LxDAURQMq6IyzF1f5A63vpR95WZaiozDgwtkPafvCRNq0tBH031sc7-YuzuXC2YjrMAYW4gEhRQTzVH9UdYrGYKowAzBXYgOEVCpFUN6K3bJ8wpqiIDD6Tuwr2fklzr75itxJP0w9DxyijX4McnQynlnyd-TQrXhpzzysqJXTPEZu_0bD2HF_L26c7Rfe_fdWHF-ej_Vrcnjfv9XVIfGkY9Jk3Bi0Os-ZUVnHBRkgsESlywtbIrhWZUqb0oFtraZGYwFuFbDoDEG2FY-XW8_Mp2n2g51_ThfT7BeXnkt9
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSAC.1991.213009
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 164
ExternalDocumentID 213009
GroupedDBID 6IE
6IK
6IL
AAJGR
AAWTH
ACGHX
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i87t-b3eb91a744ee12afe589080a886f45a610fc232796f0aca78b7150f081a1f9803
IEDL.DBID RIE
ISBN 0818622806
9780818622809
IngestDate Tue Aug 26 17:31:27 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i87t-b3eb91a744ee12afe589080a886f45a610fc232796f0aca78b7150f081a1f9803
PageCount 13
ParticipantIDs ieee_primary_213009
PublicationCentury 1900
PublicationDate 19910000
PublicationDateYYYYMMDD 1991-01-01
PublicationDate_xml – year: 1991
  text: 19910000
PublicationDecade 1990
PublicationTitle Computer Security Applications, 7th Annual Conference
PublicationTitleAbbrev CSAC
PublicationYear 1991
Publisher IEEE Comput. Soc. Press
Publisher_xml – name: IEEE Comput. Soc. Press
SSID ssj0000558097
Score 1.2141633
Snippet Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model,...
SourceID ieee
SourceType Publisher
StartPage 152
SubjectTerms Access control
Information security
Information systems
Power engineering and energy
Power system modeling
Power system protection
Public key
Safety
Scanning probe microscopy
Software systems
Title A distributed implementation of the extended schematic protection model
URI https://ieeexplore.ieee.org/document/213009
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NS8MwFMCD7rSTXxO_ycFrtnRN0uQ4hnMIiuCE3UaSvsAQN9Hu4l9vXtpOFA9CD01pS5pA3_fvEXKt4v8OMgdMcVEyAUoyDcoxXubY6EEan1wD9w9q-izu5nLecLZTLQwApOQz6ONpiuWXa79BV9lgiLEXs0t2o91Wl2pt3SlcSs0R8tdNjDaEvKiGr9OOTRul5GYwfhqNsVAvWojpnT96qyTRMtmra7Y_EpEQM0pe-pvK9f3nL17jP2e9T3rfNXz0cSudDsgOrI7I7YiWSMrFJldQ0uVrmz2O20PXgUZ1kLZ-cRoN35roShuaA96UWuf0yGxyMxtPWdNKgS11UTGXgzOZLYQAyIY2gNQmqopWaxWEtFGFCj6qVoVRgVtvC-2KqCiGuHQ2C0bz_Jh0VusVnBBqMRTpgwduh0I5YXIXny98HJmcl_qUHOISLN5qWMai_vqzP6-ek26deYXHBelU7xu4jDK-cldpd78A_OeipA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NS8MwFMCDzoOe_Jr4bQ5es6VrkibHMZxTtyE4YbeRpC8wxE20u_jXm6TtRPEg9JCUtKQJ9L28j99D6Fr4_x0kBoigLCcMBCcShCE0T0OhB65sNA2MxmLwzO6nfFpxtmMuDADE4DNohWb05edLuwqmsnYn-F7UJtryYp8nZbLW2qBCOZc0YP52IqUtYF5ERdip-6r2U1LV7j11eyFVz58R41t_VFeJwqW_W2Ztf0QmYYgpeWmtCtOyn7-Ijf-c9x5qfmfx4ce1fNpHG7A4RLddnAdWbihzBTmev9bx42GD8NJhrxDi2jKO_dG3ZLriiucQBsXiOU006d9MegNSFVMgc5kVxKRgVKIzxgCSjnbApfLKopZSOMa1V6Kc9cpVpoSj2upMmsyris4vnU6ckjQ9Qo3FcgHHCOvgjLTOAtUdJgxTqfHPZ9b3VEpzeYIOwhLM3kpcxqz8-tM_716h7cFkNJwN78YPZ2injMMK1zlqFO8ruPASvzCXcae_AK3qpe0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Computer+Security+Applications%2C+7th+Annual+Conference&rft.atitle=A+distributed+implementation+of+the+extended+schematic+protection+model&rft.au=Ammann%2C+P.&rft.au=Sandhu%2C+R.S.&rft.au=Suri%2C+G.S.&rft.date=1991-01-01&rft.pub=IEEE+Comput.+Soc.+Press&rft.isbn=9780818622809&rft.spage=152&rft.epage=164&rft_id=info:doi/10.1109%2FCSAC.1991.213009&rft.externalDocID=213009
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/sc.gif&client=summon&freeimage=true