作者: Wook Shin , Jong-Youl Park , Dong-Ik Lee
DOI: 10.1093/IETISY/E88-D.3.619
关键词:
摘要: The current scheme of access control judges the legality each based on immediate information without considering associate hidden in a series accesses. Due to deficiency, systems do not efficiently limit attacks consist ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints refuse those attacks. With constraints, can discriminate attack trials from normal behaviors. This paper shows specification concept model, presents simple analysis results.