A distributed implementation of the extended schematic protection model
Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ull...
Saved in:
Published in | Computer Security Applications, 7th Annual Conference pp. 152 - 164 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE Comput. Soc. Press
1991
|
Subjects | |
Online Access | Get full text |
ISBN | 0818622806 9780818622809 |
DOI | 10.1109/CSAC.1991.213009 |
Cover
Loading…
Abstract | Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.< > |
---|---|
AbstractList | Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the extended schematic protection model (ESPM) has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman (1976). Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus ESPM is a very general model, and it is of interest whether ESPM can be implemented in a reasonable manner. The authors outline a distributed implementation for ESPM. The implementation is capability-based, with an architecture where servers act as mediators to all subject and object access. Capabilities are made nontransferable by burying the identity of subjects in them, and unforgeable by using a public key encryption algorithm. Timestamps and public keys are used as mechanisms for revocation.< > |
Author | Suri, G.S. Sandhu, R.S. Ammann, P. |
Author_xml | – sequence: 1 givenname: P. surname: Ammann fullname: Ammann, P. organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA – sequence: 2 givenname: R.S. surname: Sandhu fullname: Sandhu, R.S. organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA – sequence: 3 givenname: G.S. surname: Suri fullname: Suri, G.S. organization: Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA |
BookMark | eNotj01LxDAURQMq6IyzF1f5A63vpR95WZaiozDgwtkPafvCRNq0tBH031sc7-YuzuXC2YjrMAYW4gEhRQTzVH9UdYrGYKowAzBXYgOEVCpFUN6K3bJ8wpqiIDD6Tuwr2fklzr75itxJP0w9DxyijX4McnQynlnyd-TQrXhpzzysqJXTPEZu_0bD2HF_L26c7Rfe_fdWHF-ej_Vrcnjfv9XVIfGkY9Jk3Bi0Os-ZUVnHBRkgsESlywtbIrhWZUqb0oFtraZGYwFuFbDoDEG2FY-XW8_Mp2n2g51_ThfT7BeXnkt9 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSAC.1991.213009 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EndPage | 164 |
ExternalDocumentID | 213009 |
GroupedDBID | 6IE 6IK 6IL AAJGR AAWTH ACGHX ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIB RIC RIE RIL |
ID | FETCH-LOGICAL-i87t-b3eb91a744ee12afe589080a886f45a610fc232796f0aca78b7150f081a1f9803 |
IEDL.DBID | RIE |
ISBN | 0818622806 9780818622809 |
IngestDate | Tue Aug 26 17:31:27 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i87t-b3eb91a744ee12afe589080a886f45a610fc232796f0aca78b7150f081a1f9803 |
PageCount | 13 |
ParticipantIDs | ieee_primary_213009 |
PublicationCentury | 1900 |
PublicationDate | 19910000 |
PublicationDateYYYYMMDD | 1991-01-01 |
PublicationDate_xml | – year: 1991 text: 19910000 |
PublicationDecade | 1990 |
PublicationTitle | Computer Security Applications, 7th Annual Conference |
PublicationTitleAbbrev | CSAC |
PublicationYear | 1991 |
Publisher | IEEE Comput. Soc. Press |
Publisher_xml | – name: IEEE Comput. Soc. Press |
SSID | ssj0000558097 |
Score | 1.2141633 |
Snippet | Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 152 |
SubjectTerms | Access control Information security Information systems Power engineering and energy Power system modeling Power system protection Public key Safety Scanning probe microscopy Software systems |
Title | A distributed implementation of the extended schematic protection model |
URI | https://ieeexplore.ieee.org/document/213009 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NS8MwFMCD7rSTXxO_ycFrtnRN0uQ4hnMIiuCE3UaSvsAQN9Hu4l9vXtpOFA9CD01pS5pA3_fvEXKt4v8OMgdMcVEyAUoyDcoxXubY6EEan1wD9w9q-izu5nLecLZTLQwApOQz6ONpiuWXa79BV9lgiLEXs0t2o91Wl2pt3SlcSs0R8tdNjDaEvKiGr9OOTRul5GYwfhqNsVAvWojpnT96qyTRMtmra7Y_EpEQM0pe-pvK9f3nL17jP2e9T3rfNXz0cSudDsgOrI7I7YiWSMrFJldQ0uVrmz2O20PXgUZ1kLZ-cRoN35roShuaA96UWuf0yGxyMxtPWdNKgS11UTGXgzOZLYQAyIY2gNQmqopWaxWEtFGFCj6qVoVRgVtvC-2KqCiGuHQ2C0bz_Jh0VusVnBBqMRTpgwduh0I5YXIXny98HJmcl_qUHOISLN5qWMai_vqzP6-ek26deYXHBelU7xu4jDK-cldpd78A_OeipA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NS8MwFMCDzoOe_Jr4bQ5es6VrkibHMZxTtyE4YbeRpC8wxE20u_jXm6TtRPEg9JCUtKQJ9L28j99D6Fr4_x0kBoigLCcMBCcShCE0T0OhB65sNA2MxmLwzO6nfFpxtmMuDADE4DNohWb05edLuwqmsnYn-F7UJtryYp8nZbLW2qBCOZc0YP52IqUtYF5ERdip-6r2U1LV7j11eyFVz58R41t_VFeJwqW_W2Ztf0QmYYgpeWmtCtOyn7-Ijf-c9x5qfmfx4ce1fNpHG7A4RLddnAdWbihzBTmev9bx42GD8NJhrxDi2jKO_dG3ZLriiucQBsXiOU006d9MegNSFVMgc5kVxKRgVKIzxgCSjnbApfLKopZSOMa1V6Kc9cpVpoSj2upMmsyris4vnU6ckjQ9Qo3FcgHHCOvgjLTOAtUdJgxTqfHPZ9b3VEpzeYIOwhLM3kpcxqz8-tM_716h7cFkNJwN78YPZ2injMMK1zlqFO8ruPASvzCXcae_AK3qpe0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Computer+Security+Applications%2C+7th+Annual+Conference&rft.atitle=A+distributed+implementation+of+the+extended+schematic+protection+model&rft.au=Ammann%2C+P.&rft.au=Sandhu%2C+R.S.&rft.au=Suri%2C+G.S.&rft.date=1991-01-01&rft.pub=IEEE+Comput.+Soc.+Press&rft.isbn=9780818622809&rft.spage=152&rft.epage=164&rft_id=info:doi/10.1109%2FCSAC.1991.213009&rft.externalDocID=213009 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818622809/sc.gif&client=summon&freeimage=true |