The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—In this paper, we describe a high assurance discretionary access control model for object-oriented systems. The model not only ensures protection against Trojan horses leaking information, but provides the flexibility of discretionary access control at the same time. The basic idea of our approach is to check all information flows among objects in the system in order to block possible illegal flows. An illegal flow arises when information is transmitted from one object to another object in violation of the security policy. The interaction modes among objects are taken into account in determining illegal flows. We consider three different interaction modes that are standard interaction modes found in the open distributed processing models. The paper presents formal definitions and proof of correctness of our flow control algorithm.</p>
Object-oriented databases and systems, security, discretionary access control, mandatory access control, Trojan horse, distributed processing.

P. Samarati, E. Bertino, S. Jajodia and A. Ciampichetti, "Information Flow Control in Object-Oriented Systems," in IEEE Transactions on Knowledge & Data Engineering, vol. 9, no. , pp. 524-538, 1997.
93 ms
(Ver 3.3 (11022016))