DocumentCode
498498
Title
Compatible and Usable Mandatory Access Control for Good-enough OS Security
Author
Shan, Zhiyong
Author_Institution
Comput. Sci. Dept., Renmin Univ. of China, Beijing, China
Volume
1
fYear
2009
fDate
22-24 May 2009
Firstpage
246
Lastpage
250
Abstract
OS compromise is one of the most serious computer security problems today, but still not being resolved. Although people proposed different kinds of methods, they could not be accepted by most users who are non-expert due to the lack of compatibility and usability. In this paper, we introduce a kind of new mandatory access control model, named CUMAC, that aims to achieve good-enough security, high compatibility and usability. It has two novel features. One is access control based on tracing potential intrusion that can reduce false negatives and facilitate security configuration, in order to improve both compatibility and usability; the other is automatically figuring out all of the compatibility exceptions that usually incurs incompatible problems. The experiments performed on the prototype show that CUMAC can defense attacks from network, mobile disk and local untrustable users while keeping good compatibility and usability.
Keywords
authorisation; operating systems (computers); CUMAC; OS security; computer security; mandatory access control model; operating system security; Access control; Companies; Computer hacking; Computer science; Computer security; Electronic commerce; Operating systems; Potential well; Prototypes; Usability; Access Control; Compatibility; Usability;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Conference_Location
Nanchang
Print_ISBN
978-0-7695-3643-9
Type
conf
DOI
10.1109/ISECS.2009.29
Filename
5209875
Link To Document