Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents can be protected appropriately and the period of access to them controlled; and cryptographic keys configured to automatically expire and be unusable beyond a specific time. This thesis implements a prototype of the Time Interval Access Control (TIAC) model in the context of a protected file system for the popular open-source Linux operating system. The Linux Security Module framework is used for the implementation, which includes temporal attributes associated both with the files and the users. The implementation includes modifications to the file system as well as low-level information access constructs. As part of the design process, testing and performance analysis were conducted. Since the temporal access control mechanism is built into the kernel rather than the application, bypassing the mechanism becomes more difficult. Kernel level implementation also affords the same policy enforcement functionality to different applications, thus reducing human errors in their development. This thesis is relevant to the research on dynamic security services for information protection envisioned by the DoD Global Information Grid (GIG).
Populaire auteurs
Cram101 Textbook Reviews (948) J.S. Bach (447) Wolfgang Amadeus Mozart (306) Collectif (268) Schrijf als eerste een recensie over dit item (265) Doug Gelbert (238) Charles Dickens (222) Princess of Patterns (211) Jules Verne (199) R.B. Grimm (197) William Shakespeare (190) Anonymous (188) Carolyn Keene (187) Gilad Soffer (187) Mark Twain (187) Philipp Winterberg (181) Edgar Allan Poe (173) Youscribe (172) Lucas Nicolato (170) Herman Melville (169)Populaire gewichtsboeken
418 KB 425 KB 435 KB 459 KB 474 KB 386 KB 445 KB 439 KB 455 KB 413 KB 432 KB 421 KB 471 KB 493 KB 472 KB 485 KB 416 KB 451 KB 369 KB 427 KB