Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Traducement: a model for record security
Walcott T., Bishop M. ACM Transactions on Information and System Security7 (4):576-590,2004.Type:Article
Date Reviewed: May 24 2005

Walcott and Bishop describe a security model that addresses the need for the digital signing of government documents, so that document authors and the people who sign the document can be clearly established. The authors summarize other well-known security models, such as Bell--LaPadula, Biba, Clark-Wilson, and Chinese Wall. They also briefly cover models that are not as well known, including originator controlled (ORCON) and clinical information systems security (CISS), and elaborate on their shortcomings with respect to the application domain.

The authors first define the creation rule and the alteration rule. When a file is created by an author, it is not automatically signed, because the author may simply produce a draft that he or she would not like to sign. The author’s identity is stored in the author set of the document. Similarly, the alteration of an existing document voids all previous signatures in the signer set, and adds the user to the author set.

The signature rule leaves the author set unmodified, and adds the user to the signer set. The copy rule retains both sets unmodified. The authors of the paper formally show that, if a system is once in a secure state, it cannot reach an insecure state by performing any sequence of the aforementioned operations. The proof is quite straightforward.

An important issue that needs to be addressed to use such a system is unique names for users and signers (for example, X.509 distinguished names). The authors conclude the paper by giving an example for each of the rules. The model presented seems obvious, and the proposed approach does not seem very new; the proof, however, is a relevant contribution. This is a very useful paper if you need a proof that shows that such create, sign, and modify operations are secure.

Reviewer:  Edgar R. Weippl Review #: CR131318 (0512-1323)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Protection Mechanisms (D.2.0 ... )
 
 
Access Controls (D.4.6 ... )
 
 
Government (J.1 ... )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
 
Database Administration (H.2.7 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Protection Mechanisms": Date
Building secure software: how to avoid security problems the right way
Viega J. (ed), McGraw G., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  493, Type: Book (9780201721522)
Apr 22 2002
Pluggable verification modules: an extensible protection mechanism for the JVM
Fong P.  Object-oriented programming, systems, languages, and applications (Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, Vancouver, BC, Canada, Oct 24-28, 2004)404-418, 2004. Type: Proceedings
Jul 21 2005
Hybrid static-dynamic attacks against software protection mechanisms
Madou M., Anckaert B., De Sutter B., De Bosschere K.  Digital rights management (Proceedings of the 5th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, Nov 7, 2005)75-82, 2005. Type: Proceedings
Feb 8 2006
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy