Skip to main content

A New Approach to Security Evaluation of Operating Systems

  • Conference paper
Computer Network Security (MMM-ACNS 2007)

Abstract

This paper addresses to the technique of security evaluation based on security attributes analysis in discretionary access control. A multi-level framework is built to calculate a set of effective user’s permissions automatically. Information about the effective access rights is necessary during security verification procedure. In this paper we also propose a schema of Security Evaluation System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.kb.cert.org/vuls/id/181038 http://secunia.com/advisories/18255

  2. Dillard, K., Maldonado, J., Warrender, B.: Microsoft Solutions for Security. Windows Server 2003 Security Guide. Microsoft (2003)

    Google Scholar 

  3. Common Criteriag. ISO/IEC 15408. Information technology. Security techniques. Evaluation criteria for IT security (2005)

    Google Scholar 

  4. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proc. of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  5. Hoagland, J.A., Panday, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Tech. report CSE-98-3 (1998)

    Google Scholar 

  6. Dai, J., Alves-Foss, J.: A Formal Authorization Policy Model. Proc. Software Engineering Research & Applications (2003)

    Google Scholar 

  7. Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A logic-based network security analyzer. In: 14th USENIX Security Symposium (2005)

    Google Scholar 

  8. Windows Access Control Demystified. Technical Report TR-744-06

    Google Scholar 

  9. Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM 19(8) (1976)

    Google Scholar 

  10. LaPadula, L.J., Bell, D.E.: Secure computer systems: A mathematical model, ESD-TR-278, V. 2, The Mitre Corp. (1973)

    Google Scholar 

  11. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: Proc. of the 15th NIST-NCSC National Computer Security Conference (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O. (2007). A New Approach to Security Evaluation of Operating Systems. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73986-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73985-2

  • Online ISBN: 978-3-540-73986-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics