J4 ›› 2012, Vol. 47 ›› Issue (11): 18-23.

• Articles • Previous Articles     Next Articles

Research on the privilege separation model of  high level information systems

LI Yu, MA Chao-bin   

  1. Evaluation Department, National Secrecy Science and Technology Evaluation Center, Beijing 100044, China
  • Received:2012-07-03 Online:2012-11-20 Published:2012-11-26

Abstract:

The privileges of the superuser can cause a lot of malicious attacks. To solve the problem, the privilege separation model in high level information systems was proposed. The administrator in operating system was decomposed into three roles. The formal definition of support and constraints relationships of the permissions was obtained. Besides, the privilege separation algorithm and security theorems were proposed in the model. Through the formal analysis, it is proved that the privileges of different roles in the algorithm meet the support and constraints relationships. The model can ensure the implementation of principle of least privilege effectively.

Key words:  privilege separation; least privilege; security model; operating system

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!