메뉴 건너뛰기




Volumn 64, Issue 1-2, 2009, Pages 121-146

A component-based policy-neutral architecture for kernel-level access control

Author keywords

Access control; Authorization; Component based architectures; Flexibility; Operating systems; Policy neutral authorization; Security kernels

Indexed keywords

AUTHORIZATION; COMPONENT-BASED ARCHITECTURES; FLEXIBILITY; OPERATING SYSTEMS; POLICY-NEUTRAL AUTHORIZATION; SECURITY KERNELS;

EID: 60849133598     PISSN: 00034347     EISSN: 19589395     Source Type: Journal    
DOI: 10.1007/s12243-008-0071-0     Document Type: Article
Times cited : (9)

References (70)
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • Technical report no MTR-2997. MITRE Corporation, Bedford, MA
    • Bell D, La Padula L (1975) Secure computer system: unified exposition and Multics interpretation. Technical report no MTR-2997. MITRE Corporation, Bedford, MA
    • (1975)
    • Bell, D.1    La Padula, L.2
  • 7
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report no. MTR-3153. MITRE Corporation, Bedford, MA
    • Biba K (1977) Integrity considerations for secure computer systems. Technical Report no. MTR-3153. MITRE Corporation, Bedford, MA
    • (1977)
    • Biba, K.1
  • 11
    • 0037232265 scopus 로고    scopus 로고
    • Security in an autonomic computing environment
    • Chess D, Palmer C, White S (2003) Security in an autonomic computing environment. IBM Syst J 42(1):107-118
    • (2003) IBM Syst J , vol.42 , Issue.1 , pp. 107-118
    • Chess, D.1    Palmer, C.2    White, S.3
  • 12
    • 33845537277 scopus 로고    scopus 로고
    • Self-protection for distributed component-based applications. International Symposium on Stabilization, Safety, and Security of Distributed Systems
    • Claudel B, De Palma N, Lachaize R, Hagimont D (2006) Self-protection for distributed component-based applications. International Symposium on Stabilization, Safety, and Security of Distributed Systems, formerly Symposium on Self-stabilizing Systems (SSS), pp 184-198
    • (2006) formerly Symposium on Self-stabilizing Systems (SSS) , pp. 184-198
    • Claudel, B.1    De Palma, N.2    Lachaize, R.3    Hagimont, D.4
  • 16
    • 0000338326 scopus 로고
    • Programming semantics for multi-programmed computations
    • Dennis JB, Van Horn E (1966) Programming semantics for multi-programmed computations. Commun ACM 9(3): 143-154
    • (1966) Commun ACM , vol.9 , Issue.3 , pp. 143-154
    • Dennis, J.B.1    Van Horn, E.2
  • 19
    • 60849124321 scopus 로고    scopus 로고
    • An access control system and method, a component-based kernel including it, and its use
    • US Patent Application no. 11,792,900
    • Fassino J-P, Jarboui T, Lacoste M (2008) An access control system and method, a component-based kernel including it, and its use. US Patent Application no. 11,792,900
    • (2008)
    • Fassino, J.-P.1    Jarboui, T.2    Lacoste, M.3
  • 22
    • 0037236308 scopus 로고    scopus 로고
    • The dawning of the autonomic computing era
    • Ganek A, Corbi T (2003) The dawning of the autonomic computing era. IBM Syst J 42(1):5-18
    • (2003) IBM Syst J , vol.42 , Issue.1 , pp. 5-18
    • Ganek, A.1    Corbi, T.2
  • 25
    • 0041865338 scopus 로고    scopus 로고
    • Separating access control policy enforcement and functionality in extensible systems
    • Grimm R, Bershad B (2001) Separating access control policy enforcement and functionality in extensible systems. ACM Trans Comput Syst 19(l):36-70
    • (2001) ACM Trans Comput Syst , vol.19 , Issue.L , pp. 36-70
    • Grimm, R.1    Bershad, B.2
  • 26
    • 60849112916 scopus 로고    scopus 로고
    • ARM Dons Armor: TrustZone security extensions strengthen ARMv6 Architecture
    • August 25th
    • Halfhill T (2003) ARM Dons Armor: TrustZone security extensions strengthen ARMv6 Architecture. Microprocessor Report, August 25th
    • (2003) Microprocessor Report
    • Halfhill, T.1
  • 27
    • 0007935332 scopus 로고
    • The KeyKOS architecture
    • Hardy N (1985) The KeyKOS architecture. Oper Syst Rev 19(4):8-25
    • (1985) Oper Syst Rev , vol.19 , Issue.4 , pp. 8-25
    • Hardy, N.1
  • 28
    • 84871178505 scopus 로고    scopus 로고
    • Hewlett-Packard. Jena: a semantic web framework for Java, http:// jena.sourceforge.net/
    • Hewlett-Packard. Jena: a semantic web framework for Java, http:// jena.sourceforge.net/
  • 37
    • 33847789626 scopus 로고    scopus 로고
    • CAmkES: A component model for secure microkernel-based embedded systems
    • Kuz T, Liu Y, Gorton I, Heiser G (2007) CAmkES: a component model for secure microkernel-based embedded systems. J Syst Softw 80(5):687-699
    • (2007) J Syst Softw , vol.80 , Issue.5 , pp. 687-699
    • Kuz, T.1    Liu, Y.2    Gorton, I.3    Heiser, G.4
  • 41
    • 33845221224 scopus 로고    scopus 로고
    • A policy flexible architecture for secure operating systems
    • Lin Z, Wang C, Mao B, Xie L (2005) A policy flexible architecture for secure operating systems. Oper Syst Rev 39(3):24-33
    • (2005) Oper Syst Rev , vol.39 , Issue.3 , pp. 24-33
    • Lin, Z.1    Wang, C.2    Mao, B.3    Xie, L.4
  • 44
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a Mach-based system
    • Minear S (1995) Providing policy control over object operations in a Mach-based system. Proceedings of the USENIX Security Symposium, pp 141-156
    • (1995) Proceedings of the USENIX Security Symposium , pp. 141-156
    • Minear, S.1
  • 46
    • 77952342496 scopus 로고    scopus 로고
    • The rule set based access control (RSBAC) Linux kernel security extension
    • Ott A (2001) The rule set based access control (RSBAC) Linux kernel security extension. Proceedings of the International Linux Kongress
    • (2001) Proceedings of the International Linux Kongress
    • Ott, A.1
  • 47
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • Park J, Sandhu R (2004) The UCON ABC usage control model. ACM Trans inf Syst Secur 7(1): 128-174
    • (2004) ACM Trans inf Syst Secur , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 52
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proceedings of the IEEE 63(9): 1278-1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 56
    • 0036147270 scopus 로고    scopus 로고
    • EROS: A principle-driven operating system from the ground up
    • Shapiro J, Hardy N (2002) EROS: a principle-driven operating system from the ground up. IEEE Softw 19(l):26-33
    • (2002) IEEE Softw , vol.19 , Issue.L , pp. 26-33
    • Shapiro, J.1    Hardy, N.2
  • 60
    • 51949087106 scopus 로고    scopus 로고
    • Secure architecture and implementation of Xen on ARM for mobile devices
    • April
    • Suh S (2007) Secure architecture and implementation of Xen on ARM for mobile devices. Xen Summit, April
    • (2007) Xen Summit
    • Suh, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.