A mandatory access control policy model for information security requirements

被引:0
|
作者
Leiwo, J [1 ]
Gamage, C [1 ]
Zheng, YL [1 ]
机构
[1] Monash Univ, Peninsula Sch Comp & Informat Technol, Frankston, Vic 3199, Australia
来源
PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98 | 1998年 / 20卷 / 01期
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Two basic paradigms towards specification of information security requirements can be taken: continuous specification and early specification of requirements. In models supporting continuous specification and refinement of information security requirements, the development organization is more vulnerable to the tampering with partially specified requirement primitives. This paper proposes a formal model for requirement access control to prevent unauthorized modification of security requirements, that may lead to weak or inconsistent implementation of protection measures.
引用
收藏
页码:527 / 538
页数:12
相关论文
共 50 条
  • [11] A Mandatory Access Control Model with Enhanced Flexibility
    Fan, Yanfang
    Han, Zhen
    Liu, Jiqiang
    Zhao, Yong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 120 - +
  • [12] The mandatory access control model for document flow
    Fan, Yan-Fang
    Han, Zhen
    Zhao, Yong
    Geng, Xiu-Hua
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 694 - 697
  • [13] A policy model for access control using building information models
    Skandhakumar, Nimalaprakasan
    Reid, Jason
    Salim, Farzad
    Dawson, Ed
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 : 1 - 10
  • [14] Mandatory access control model for collaborative environment
    Huang, He
    Wang, Junzhu
    Zhang, Luwei
    Zhang, Xin
    Journal of Harbin Institute of Technology (New Series), 2007, 14 (SUPPL. 2) : 189 - 192
  • [15] Collaboration supported mandatory access control model
    Fan, Yanfang
    Cai, Ying
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2411 - 2421
  • [16] Access control model based on RDB security policy for OWL ontology
    Jeong, Dongwon
    Jing, Yixin
    Baik, Doo-Kwon
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 720 - +
  • [17] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [18] Requirements for scalable access control and security management architectures
    Keromytis, Angelos D.
    Smith, Jonathan M.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (02)
  • [19] Security access control policy of information system under multi-domain mode
    Dong, Jun
    Zhao, Qiang
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2018, 11 (01) : 44 - 50
  • [20] A XML Oriented Mandatory Access Control Based on Hierarchy Security Labels
    Zhang Dongzhan
    Guo Youxian
    Wu Yashuang
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 608 - 612