|
This article is cited in 1 scientific paper (total in 1 paper)
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
Systematic analysis of access limitation process under discretionary policy of control
Sh. G. Magomedova, Yu. V. Kolotilovb a Moscow Technological University
b Gubkin Russian State University of Oil and Gas (National Research University)
Abstract:
The paper describes one of the key problems of access limitation to information resources under the discrete control policy of access – a problem of obtaining the guarantee that there will never take place any violation of the requirements of access limitation policy under the selected strategy of providing information security and strict compliance with its requirements. To solve this problem is possible only using formalized methods. There has been suggested a formalized access limitation model comprising 5 components: multitude of agents having access to data processing software and hardware; multiple facilities of data processing system (information resources and data, software, hardware), which can become the object of activities of at least one agent; mul-titude of rights of access (a set of types of access); multitude of access limitations for an agent
to a facility; multitude of requirements for the agent access; multitude of activities. The paper closely studies the component of multitude of activities, which includes all possible methods, means and techniques to deter threats and attacks, which can be used in the security system in order to provide and change ways of access of an agent to a facility. To arrange all the possible activities there have been singled out the four key criteria in terms of access limitation: the category to which the activity refers; affecting environment; the order of impact; the focus of activities. The individual characteristics of each of the four criteria have been described. Systematization criteria could lay the base of rules covering all possible situations and corresponding mechanisms of action. Creating such a base and its regular renewal and improvement are necessary for developing conditions for mass use of standard clarified protective means of information security.
Keywords:
information security, information resources, access control, formalized model, security object, access control model, subject access to the object.
Received: 13.09.2017
Citation:
Sh. G. Magomedov, Yu. V. Kolotilov, “Systematic analysis of access limitation process under discretionary policy of control”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2017, no. 4, 39–44
Linking options:
https://www.mathnet.ru/eng/vagtu504 https://www.mathnet.ru/eng/vagtu/y2017/i4/p39
|
Statistics & downloads: |
Abstract page: | 94 | Full-text PDF : | 52 | References: | 26 |
|