首页> 外文会议>Microwave and Millimetre Wave Monolithic Integrated Circuits >Access control by tracking shallow execution history
【24h】

Access control by tracking shallow execution history

机译:通过跟踪浅执行历史记录进行访问控制

获取原文
获取原文并翻译 | 示例

摘要

Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor. By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a fine-grained policy classification lays the semantic foundation for future studies on special-purpose policy languages.
机译:诸如操作系统,移动代码平台和可编写脚本的应用程序之类的软件执行环境必须保护自己免受恶意代码造成的潜在损害。监视后者的执行历史记录为控制系统服务的访问模式提供了有效的手段。最近,有几位作者提出了越来越多的通用自动机模型,用于描述可通过执行监视执行的各种安全策略。鲍尔(Bauer),利加蒂(Ligatti)和沃克(Walker)提出的一个开放问题是,是否可以通过限制执行监视器的功能来进一步对安全策略的空间进行分类。本文提出了一种新颖的基于信息的方法来解决研究问题。具体来说,安全策略的特征在于强制执行监视器消耗的信息。通过限制执行监控器仅跟踪先前授予的访问事件的浅薄历史记录,可以识别通过限制对信息的访问而可实施的一类安全策略的精确特征。尽管可证明的表达性不如通过执行监视可强制执行的一般策略类强,但该类确实包含自然发生的策略,包括中国墙策略,低水印策略,一次性授权,有保证的管道等。成功之后,该技术被普遍化以产生一系列的政策类别。在网格内,策略类按执行成员策略所需的信息排序。这种细粒度的策略分类为将来对专用策略语言的研究奠定了语义基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号