A formal protection model of security in centralized, parallel, and distributed systems
-
Published:1990-08
Issue:3
Volume:8
Page:183-213
-
ISSN:0734-2071
-
Container-title:ACM Transactions on Computer Systems
-
language:en
-
Short-container-title:ACM Trans. Comput. Syst.
Author:
Benson Glenn S.1,
Akyildiz Ian F.1,
Appelbe William F.1
Affiliation:
1. Georgia Institute of Technology, Atlanta
Abstract
One way to show that a system is not secure is to demonstrate that a malicious or mistake-prone user or program can break security by causing the system to reach a nonsecure state. A fundamental aspect of a security model is a proof that validates that every state reachable from a secure initial state is secure. A sequential security model assumes that every command that acts as a state transition executes sequentially, while a concurrent security model assumes that multiple commands execute concurrently. This paper presents a security model called the Centralized-Parallel-Distributed model (CPD model) that defines security for logically, or physically centralized, parallel, and distributed systems. The purpose of the CPD model is to define concurrency conditions that guarentee that a concurrent system cannot reach a state in which privileges are configured in a nonsecure manner. As an example, the conditions are used to construct a representation of a distributed system.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science
Reference44 articles.
1. System Overview Gemini Trusted Multiple Microcomputer Base (version 0). Carmel Calif. 0 ed. May 1985. System Overview Gemini Trusted Multiple Microcomputer Base (version 0). Carmel Calif. 0 ed. May 1985.
2. Trusted Computer Systems Evaluation Criteria. Tech. Rep. DoD 5200.28-STD National Computer Security Center Fort Meade Md. Dec. 1985. Trusted Computer Systems Evaluation Criteria. Tech. Rep. DoD 5200.28-STD National Computer Security Center Fort Meade Md. Dec. 1985.
3. A model for specifying multi-granularity integrity policies
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security framework for dynamic service-oriented IT systems;Journal of Information and Telecommunication;2018-06-04