DocumentCode :
2648079
Title :
Configuring RBAC to Simulate Bell Model
Author :
He, Yong-Zhong ; Han, Zhan ; Du, Ye
Author_Institution :
Sch. of Comput., Beijing Jiaotong Univ., Beijing
fYear :
2008
fDate :
15-17 Aug. 2008
Firstpage :
946
Lastpage :
949
Abstract :
RBAC is powerful access control model which can be configured to enforce various traditional access control policies. Configurations of RBAC for enforcement of various mandatory and discretionary access policies are presented in the literature. However, many of these configurations are flawed. We observed that the errors are mainly due to the lack of a formal definition of correctness of configuration of access control model to simulate other access control models. In this paper, we focused on simulation of Bell Model, one of important extensions to BLP model. It is demonstrated that the first configuration for Bell Model is flawed, and the correction presented later is also flawed. We give a formal definition of correctness of configuration, and then the simulation for Bell model and the proof of its correctness are proposed.
Keywords :
authorisation; Bell model simulation; access control policies; configuration correctness; role based access control model; Access control; Computational modeling; Computer applications; Computer simulation; Content addressable storage; Error correction; Helium; Information security; Permission; Signal processing; Bell model; RBAC; Simulation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
Type :
conf
DOI :
10.1109/IIH-MSP.2008.218
Filename :
4604206
Link To Document :
بازگشت