Skip to main content

An approach to dynamic domain and type enforcement

  • Security Models And Control
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

Abstract

Trusted virtual machines based on statically configured security models are either too restrictive, or too open an environment for many types of applications. The domain and type enforcement model of mandatory access control is a static approach to security that supports the principle of least privilege. We propose a dynamically configurable variant of domain and type enforcement, in which access control tables are modifiable subject to configuration controls represented in a rule-base. Two benefits accrue from this separation into table-based access control, and rule-based configuration control: simplicity, and efficiency. An example demonstrates the viability of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Badger, L., et al, Practical Domain and Type Enforcement for UNIX In Proc. 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995.

    Google Scholar 

  2. Bai, Y., and V. Varadharajan, A Model Based Semantics for Transformations of Authorization Policies In Proc. 20th Australasian Computer Science Conference, Sydney, Australia, February 1997.

    Google Scholar 

  3. Boebert, W. E. and R. Y. Kain, A Practical Alternative to Hierarchical Integrity Policies In Proc. of 8th National Computer Security Conference, Gaithersburg, MD, 1985. pp 18–27

    Google Scholar 

  4. Borenstein, N. K. EMail With A Mind of Its Own: The Safe-Tel Language for Enabled Mail In Proc. Upper Layer Protocols, Architectures and Applications, 1994.

    Google Scholar 

  5. Clark, D. D., and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies In Proc. 1987 IEEE Symposium on Security and Privacy”, April 1987. pp. 184–194.

    Google Scholar 

  6. Lampson, B. W., Protection In Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, March 1971 pp 437–443, reprinted in Operating Systems Review, 8, 1 January 1974, pp. 18–24.

    Google Scholar 

  7. Sandhu, R. S., A Lattice Interpretation of the Chinese Wall Policy In Proc. 15th NIST-NCSC National Computer Security Conference, 1992. pp 329–339

    Google Scholar 

  8. Sandu, R., and G. S. Suri, Non-Monotonic Transformation of Access Rights In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1992.

    Google Scholar 

  9. Sami Saydjari, O., J. Beckman and J. Leaman, LOCKing Computers Securely In Proc. 10th DoD/NBS Computer Security Conference, Gaithersburg, MD. September 1987. pp 129–140.

    Google Scholar 

  10. Tidswell, J., and Potter, J., Domain and Type Enforcement in a μ,-Kernel In Proceedings 20th Australasian Computer Science Conference, Sydney, Australia, February 1997.

    Google Scholar 

  11. Walker, K. M., et al, Confining Root Programs with Domain and Type Enforcement (DTE) In proc. 1996 Usenix Security Symposium, San Jose, CA.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tidswell, J., Potter, J. (1997). An approach to dynamic domain and type enforcement. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027941

Download citation

  • DOI: https://doi.org/10.1007/BFb0027941

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics