A mandatory access control policy model for information security requirements

被引:0
作者
Leiwo, J [1 ]
Gamage, C [1 ]
Zheng, YL [1 ]
机构
[1] Monash Univ, Peninsula Sch Comp & Informat Technol, Frankston, Vic 3199, Australia
来源
PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98 | 1998年 / 20卷 / 01期
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Two basic paradigms towards specification of information security requirements can be taken: continuous specification and early specification of requirements. In models supporting continuous specification and refinement of information security requirements, the development organization is more vulnerable to the tampering with partially specified requirement primitives. This paper proposes a formal model for requirement access control to prevent unauthorized modification of security requirements, that may lead to weak or inconsistent implementation of protection measures.
引用
收藏
页码:527 / 538
页数:12
相关论文
共 50 条
[11]   The mandatory access control model for document flow [J].
Fan, Yan-Fang ;
Han, Zhen ;
Zhao, Yong ;
Geng, Xiu-Hua .
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05) :694-697
[12]   The hybrid model for web services security Access control and information flow control [J].
Kedjar, Saadia ;
Tari, Abdelkamel .
2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, :194-+
[13]   A policy model for access control using building information models [J].
Skandhakumar, Nimalaprakasan ;
Reid, Jason ;
Salim, Farzad ;
Dawson, Ed .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 :1-10
[14]   Mandatory access control model for collaborative environment [J].
Huang, He ;
Wang, Junzhu ;
Zhang, Luwei ;
Zhang, Xin .
Journal of Harbin Institute of Technology (New Series), 2007, 14 (SUPPL. 2) :189-192
[15]   Collaboration supported mandatory access control model [J].
Fan, Yanfang ;
Cai, Ying .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10) :2411-2421
[16]   Access control model based on RDB security policy for OWL ontology [J].
Jeong, Dongwon ;
Jing, Yixin ;
Baik, Doo-Kwon .
COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 :720-+
[17]   An Access Control Model for Grid Computing Based on Security Information Evaluation [J].
Xie, Ping ;
Zhou, Jiang .
2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, :49-52
[18]   Requirements for scalable access control and security management architectures [J].
Keromytis, Angelos D. ;
Smith, Jonathan M. .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (02)
[19]   Security access control policy of information system under multi-domain mode [J].
Dong, Jun ;
Zhao, Qiang .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2018, 11 (01) :44-50
[20]   A XML Oriented Mandatory Access Control Based on Hierarchy Security Labels [J].
Zhang Dongzhan ;
Guo Youxian ;
Wu Yashuang .
ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, :608-612