Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software EngineeringSE-13 (2):202-207,1987.Type:Article
Date Reviewed: Dec 1 1987

As an abstraction, capability-based systems have long had a devoted following. The idea that all access to objects by programs is mediated by hardware, and only explicitly allowed access succeeds, is very seductive to computer scientists seeking a world without--or with fewer--biting bugs in programs.

Refining the abstraction in the attempt to reach real, implementable systems has proceeded slowly. A particular problem is the management of the capabilities themselves--what operations are allowed on capabilities, and what are the implications of those operations on control of access to the objects to which the capabilities are . . . capabilities?

A second concern of this paper is the ability of capability-based systems to satisfy DoD (Department of Defense) mandatory and discretionary security policies, in particular the “*-property.” Annoyingly, this paper does not define the *-property explicitly but suggests that it means that a process can read data only at its own or a lower security level, and can write data only at its own or a higher security level.

The authors review current opinion that relates capability-based systems and the DoD requirements. They then present their own taxonomy for evaluating the protection mechanisms provided by various system designs. Finally, they propose two designs, described through their taxonomy, that can enforce the *-property. It appears that the addition to the “basic” capability-based system that allows their designs to satisfy the DoD requirements is the notion that capabilities stored within a segment carry their own security level, which is not necessarily the same level as that of data stored within the same segment.

Reviewer:  C. R. Attanasio Review #: CR111786
Bookmark and Share
 
Access Controls (D.4.6 ... )
 
 
Access Methods (H.2.2 ... )
 
 
Capability Architectures (C.1.3 ... )
 
 
Requirements/ Specifications (D.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
Controls for interorganization networks
Estrin D. IEEE Transactions on Software Engineering SE-13(2): 249-261, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy