Embedding role-based access control model in object-oriented systems to protect privacy

被引:18
作者
Chou, SC [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Shoufeng 974, Hualien, Taiwan
关键词
information flow control; security; protect privacy; object-oriented systems;
D O I
10.1016/S0164-1212(02)00158-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The role-based access control (RBAC) approach has been recognized as useful in information security and many RBAC models have been proposed. Current RBAC researches focus on developing new models or enhancing existing models. In our research, we developed an RBAC model that can be embedded in object-oriented systems to control information flows (i.e. to protect privacy) within the systems. This paper proposes the model. The model, which is named OORBAC, is an extension of RBAC96. OORBAC offers the following features: (a) precisely control information flows among objects, (b) control method invocation through argument sensitivity, (c) allow purpose-oriented method invocation and prevent leakage within an object, (d) precisely control write access, and (e) avoid Trojan horses. We implemented a prototype for OORBAC using JAVA as the target language. The implementation resulted in a language named OORBACL, which can be used to implement secure applications. We evaluated OORBAC using experiments. The evaluation results are also shown in this paper. (C) 2002 Elsevier Inc. All rights reserved.
引用
收藏
页码:143 / 161
页数:19
相关论文
共 48 条
  • [1] Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
  • [2] [Anonymous], 1976, TECH REP
  • [3] [Anonymous], 1999, ACM T INFORM SYST SE
  • [4] [Anonymous], 1997, P 2 ACM WORKSH ROL B
  • [5] [Anonymous], 2000, P POPL 00
  • [6] [Anonymous], P ACM S OP SYST PRIN
  • [7] BERTINO E, 1998, EXCEPTION BASED INFO, P26
  • [8] BOOCH G, 1994, OBJECT ORIENTED ANAL
  • [9] Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
  • [10] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243