A mandatory access control policy model for information security requirements

被引:0
|
作者
Leiwo, J [1 ]
Gamage, C [1 ]
Zheng, YL [1 ]
机构
[1] Monash Univ, Peninsula Sch Comp & Informat Technol, Frankston, Vic 3199, Australia
来源
PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98 | 1998年 / 20卷 / 01期
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Two basic paradigms towards specification of information security requirements can be taken: continuous specification and early specification of requirements. In models supporting continuous specification and refinement of information security requirements, the development organization is more vulnerable to the tampering with partially specified requirement primitives. This paper proposes a formal model for requirement access control to prevent unauthorized modification of security requirements, that may lead to weak or inconsistent implementation of protection measures.
引用
收藏
页码:527 / 538
页数:12
相关论文
共 50 条
  • [1] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [2] An integrated model for access control and information flow requirements
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 111 - 125
  • [3] A Context-Aware Mandatory Access Control Model for Multilevel Security Environments
    Jafarian, Jafar Haadi
    Amini, Morteza
    Jalili, Rasool
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 401 - 414
  • [4] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [5] A Dynamic Mandatory Access Control Model
    Jafarian, Jafar Haadi
    Amini, Morteza
    Jalili, Rasool
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 862 - 866
  • [6] Enforce mandatory access control policy on XML documents
    Li, L
    Jiang, XH
    Li, JH
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 336 - 349
  • [7] Security and access control requirements for computerized systems
    McDowall, R. D.
    LC GC EUROPE, 2007, 20 (11) : 583 - 585
  • [8] Mandatory Access Control Method for Windows Embedded OS Security
    Cho, Chaeho
    Seong, Yeonsang
    Won, Yoojae
    ELECTRONICS, 2021, 10 (20)
  • [9] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
  • [10] An extended mandatory access control model for XML
    Zhang, DZ
    Xue, YS
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 280 - 281