Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Flexible control of downloaded executable content
Jaeger T., Prakash A., Liedtke J., Islam N. ACM Transactions on Information and System Security2 (2):177-228,1999.Type:Article
Date Reviewed: Oct 1 1999

Effective access control is hardly a simple matter of specifying and enforcing permissions that apply to pairs of subjects and objects. Consideration must also be given to the programs that mediate access; authentication of users, programs, and objects; rules for administration and delegation of authority; and external constraints. Most important of all, however, is providing administrators with all of the tools they need to specify the rules that can lead to effective access control that meets all of an organization’s objectives.

No one has ever discussed all of these considerations as cogently, completely, and helpfully as the authors of this paper, which describes access control software (implemented only on the Lava operating system) for a distributed application that poses formidable security challenges--the Upper Atmospheric Research Collaboratory system. Data and executables are downloaded to widely distributed systems, where they are used by personnel with diverse needs and authorities. Care must be taken to assure not only that collaborators can gain all the access they need and no more, but also that programs are confined so that they cannot impair the integrity or confidentiality of resources at the remote systems.

The authors’ lucid and detailed description of their methodology, and the extensive and very useful list of references they include, are widely applicable. Their discussions of devices for generalizing over sets, specifying exceptions to generalities, and controlling delegation are particularly useful and insightful. All in all, their exposition is a valuable contribution to the literature that any designer of access control software would do well to read.

Reviewer:  S. A. Kurzban Review #: CR122592 (9910-0777)
Bookmark and Share
 
Access Controls (D.4.6 ... )
 
 
Centralization/ Decentralization (K.6.4 ... )
 
 
Invasive Software (D.4.6 ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy