Affiliation:
1. Univ. of California, Berkeley
2. Princeton, Univ., Princeton, NJ
Abstract
A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed.
Publisher
Association for Computing Machinery (ACM)
Cited by
515 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Has Access Control Become the Weak Link?;IEEE Security & Privacy;2024-09
2. Beyond Traditional Methods: Deep Learning with Data Augmentation for Robust Access Control;2024 33rd International Conference on Computer Communications and Networks (ICCCN);2024-07-29
3. A COMPREHENSIVE INFOLOGICAL MODEL OF CONFIDENTIAL INFORMATION PROTECTION OBJECTS;Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»;2024-07-14
4. Formal Modelling and Implementation of Clark-Wilson Security Policy with FoCaLiZe;2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS);2024-04-24
5. Blockchain-based access control architecture for multi-domain environments;Pervasive and Mobile Computing;2024-02