A New General Graph-based Model for Non-Monotonic Protection Systems

Publish Year: 1385
نوع سند: مقاله کنفرانسی
زبان: English
View: 2,323

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCEE09_052

تاریخ نمایه سازی: 13 اسفند 1386

Abstract:

One of the most challenging problems in security is the safety problem in which we should determine whether a subject can gain access to an object or not. Many approaches have been proposed to address this problem. Nevertheless, most of them lack the ability to model real-world systems or suffer from efficiency problems. In this paper, we propose a general graph-based protection system. In addition to monotonic rules, both non-monotonic rules and rules which may check for absence of rights as their preconditions are included in our model. Moreover, broad range of vulnerabilities including most of DoS vulnerabilities can be modeled via these general rules easily. It is proved that the safety problem in general form of our proposed model is NP-Complete. However, we introduce some simplified cases of the model, such as monotonically increasing systems and systems which contain only permanent rules, in which the safety problem can be answered in polynomial time.

Authors

Mohammad Ebrahim Rafiei

Network Security Center, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

Hamid Mousavi

Network Security Center, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

Hamid Reza Shahriari

Network Security Center, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

Reza Sadoddin

Network Security Center, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • M. Bishop. "Computer Security: The Art and Science, " Addis ...
  • J.S. Shapiro. :The practical application of a decidable access control ...
  • , John Hopkins University, 2003. ...
  • A.K. Jones, R.J. Lipton, and L. Snyder.، 0A linear time ...
  • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman. ، ،Protection in ...
  • X Zhang, Y Li, and D Nalla.، An attribute based ...
  • M. Bishop. *Conspiracy and information flow in the Take-Grant protection ...
  • M. Bishop.، Practical Take-Grant Systems: Do They Exist?^ Ph.D. Thesis, ...
  • SIGCOMM Computer C ommunication Review, 34(2), April 2004. ...
  • M.R. Garey, and D.S. Johnson. *Computers and intractability: A guide ...
  • complexity of theorem proving Theء، [27] S.A. Cook. procedures, * ...
  • O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. ...
  • R.J. Lipton and L. Snyder. «On S y nchronization and ...
  • M.V. Tripunitara and N. Li. *Comparing the expressive power of ...
  • A.R. Sharafat and M.S. Fallah.، 0A framework for the analysis ...
  • J. Mirkovic, and P. Reiher. *A taxonomy of DDoS attack ...
  • نمایش کامل مراجع