skip to main content
10.1145/1063979.1063982acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Composing and combining policies under the policy machine

Authors Info & Claims
Published:01 June 2005Publication History

ABSTRACT

As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods for configuring policy, and a tight coupling to a class of policies. To afford generalized protection, NIST has initiated a project in pursuit of a standardized access control mechanism, referred to as the Policy Machine (PM) that requires changes only in its configuration in the enforcement of arbitrary and organization specific attribute-based access control policies. Included among the PM's enforceable policies are combinations of policy instances (e.g., Role-Based Access Control and Multi-Level Security). In our effort to devise a generic access control mechanism, we construct the PM in terms of what we believe to be abstractions, properties and functions that are fundamental to policy configuration and enforcement. In its protection of objects under one or more policy instances, the PM categorizes users and objects and their attributes into policy classes, and transparently enforces these policies through a series of fixed PM functions, that are invoked in response to user or subject (process) access requests.

References

  1. National Commission on Terrorist Attacks Upon the United States. The 9/11 Commission Report, 2004.Google ScholarGoogle Scholar
  2. Anderson, J.P., Computer Security Technology Planning Study, Tech Report ESD-TR-73-51, US Air Force Electronic Systems Div., Hanscom AFB, 1972.Google ScholarGoogle Scholar
  3. B. Lampson. Protection. ACM Operating Sys. Reviews, 8, 1 (1974), 18--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63, 9 (September 1975), 1278--1308.Google ScholarGoogle ScholarCross RefCross Ref
  5. ANSI INCITS 359-2004, Role-Based Access Control.Google ScholarGoogle Scholar
  6. D. Bell and La Padula. Secure computer systems: unified exposition and MULTICS. Report ESD-TR-75-306, The MITRE Corporation, Bedford, Massachusetts, March 1976.Google ScholarGoogle ScholarCross RefCross Ref
  7. Peter A. Loscocco, and Stephen P. Smalley. Meeting Critical Security Objectives with Security Enhanced Linux, Proc. 2001 Ottowa Linux Symposium, 2001.Google ScholarGoogle Scholar
  8. D.F. Ferraiolo, J. Barkley, D.R. Kuhn, A Role Based Access Control Model and Reference Implementation within a Corporate Intranet, ACM Transactions on Information Systems Security, 1, 2 (February 1999), 34--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, (April 1977).Google ScholarGoogle Scholar
  10. G. Saunders. Role-Based Access Control and the Access Control Matrix. ACM SIGOPS Operating System and Review, 35, 4 (2001), 6--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Badger, et al. A Domain and Type Enforcement Prototype. Computing Systems, 9, 1 (1996), 47--83.Google ScholarGoogle Scholar
  12. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models, IEEE Computer, 29, 2 (Feb. 1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Osborn, R. Sandhu, and Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security, 3, 2 (May 2002), 85--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Jajodia, S. Pierangela, M. L. Sapino, V. S. Sabrahmanian. Flexible Support for Multiple Access Control Policies, ACM Transactions on Database Systems, 26, 2 (June 2001), 214--260. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Composing and combining policies under the policy machine

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
          June 2005
          186 pages
          ISBN:1595930450
          DOI:10.1145/1063979
          • General Chair:
          • Elena Ferrari,
          • Program Chair:
          • Gail-Joon Ahn

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader