The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1981)
Oakland, CA
Apr. 27, 1981 to Apr. 29, 1981
ISSN: 1540-7993
ISBN: 0-8186-0345-3
pp: 9
Allen Stoughton , University of California, Los Angeles
Past work concerning operating system protection has focused on two notions: access control and information flow. Access control or protection matrix based protection systems control the ways in which users may manipulate objects. Information flow or security class based systems control the flow of information between users. Although it has been noted that both notions are essential to real protection systems, no previous work has compared the two notions, or developed a protection model that integrates those notions. This paper compares and contrasts access control and information flow and supports the assertion that both notious are essential to real protection systems. It is argued that the military classification model of information flow poorly models reality, and a new information flow model based on the controlled sharing of secrets is introduced. A protection model that integrates access control and information flow is then developed and formally defined, and some example applications of this model are described.
Allen Stoughton, "Access Flow: A Protection Model which Integrates Access Control and Information Flow", 2012 IEEE Symposium on Security and Privacy, vol. 00, no. , pp. 9, 1981, doi:10.1109/SP.1981.10004
98 ms
(Ver 3.1 (10032016))