[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Formally Specifying Linux Protection

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

Authorization and protection deal with the problem of the control of access to resources. A key aspect of modern computing systems is resource sharing, so a need arose to govern access to these resources only to authorized users. In multi-user operating systems (such as Linux) authorization is of great interest. Computer security and authorization as a subset is characterized by the fact that a security fault or hole can be very costly. It is of great interest therefore to formalize and reason about security. Z notation is a powerful well-known formal notation based on set theory and predicate calculus which provides both abstraction and formalism. This work reports a formal expression in the Z notation for the basic protection (authorization) system of the Linux operating system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Akyildiz, I. And Benson G., 1989, “Security Models of Distributed Systems”. In Proceedings of the 4th International Symposium on Computer and Information Sciences, A. Dogacand E. Gelenbe, Eds.Turkey.

    Google Scholar 

  • Bell and LaPadula, 1973, “Secure Computer Systems : Mathematical Foundations”. ESD-TR-278, 1 , ESD/AFSC, Hanscom AFB, Bedford, Ma.

    Google Scholar 

  • Bertino Elisa et al, 1996, “A Temporal Access Control Mechanism for Database Systems”, IEEE Transactions on Knowledge and Data Engineering Vol. 8, No. 1.

    Google Scholar 

  • Bertino Elisa et al, 1996, “Supporting Periodic Authorization and Temporal Reasoning in Database Access Control,” Proceeding of the 22nd VLDB conference Mumbai, India.

    Google Scholar 

  • Bertino Elisa, P. Sammarati and S. Jajodia, 1997, “An Extended Authorization Model for Relational Databases.” IEEE Transactions on Knowledge and Data Engineering.

    Google Scholar 

  • Bertino Elisa et al, 1997, “A Flexible model for the Specification and Enforcement of Authorizations in Workflow Management Systems” Technical Report, University of Milano.

    Google Scholar 

  • Boswell A., 1995, “Specification and Validation of a Security Policy Model,” in IEEE Transactions on Software Engineering, Vol. 21, No.2Benson G., I. Akyildiz and W. Applebe, 1990, “A Formal Protection Model of Security in Centralized, Parallel and Distributed Systems.” ACM Transaction on Computer Systems.

    Google Scholar 

  • Boyd Colin, 1993, “Security Architectures Using Formal Methods,” IEEE Journal On Selected Areas In Communications.

    Google Scholar 

  • Charles P. Pfleeger, 1989, “Security In Computing,” Prentice Hall.

    Google Scholar 

  • Denning D.E., 1976, “A Lattice Model of Secure Information Flow”. Communications of the ACM.

    Google Scholar 

  • Denning Dorothy, 1982, “Cryptography and Data Security,” Addison-Wesley.

    Google Scholar 

  • Glasgow J., G.MacEwen and P. Panangaden, 1992, “A Logic for Reasoning About Security,” ACM Transaction on Computer Systems.

    Google Scholar 

  • Goscinski A. G., 1991 “Distributed Operating Systems The Logical Design,” Adison-Wesly.

    Google Scholar 

  • Graham and Denning, 1972, “Protection Principles and practices.” Proceedings of the AFIPS Spring Joint Computer Conference.

    Google Scholar 

  • Harrison, Ruzzo and Ullman, 1976, “Protection in operating system,” Communications of the ACM.

    Google Scholar 

  • Johnson Michael & Troan Erik, 2005, “Linux Application Development”, 2nd edition, Pearson Education.

    Google Scholar 

  • Kwon J., Chang-Joo Moon, 2007, “Visual Modeling and Formal Specification of Constraints of RBAC Using Semantic Web Technology,” Knowledge-Based System, Volume 20, Issue 4.

    Google Scholar 

  • Lampson B. W., 1971, “Protection”. Fifth Princeton Conference on Information and Systems Sciences.

    Google Scholar 

  • Landwehr C.E., 1981, “Formal Models for Computer Security.” ACM Computing Surveys 13(3).

    Google Scholar 

  • Leiss Ernst, 1982, “Principles of Data Security,” Plenum Press.

    Google Scholar 

  • Mclean John, 1990, “The Specification And Modeling Of Computer Security.” IEEE Computer, Volume 23, Issue 1.

    Google Scholar 

  • Peleg M., Dizza Beimel, Dov Dori, Yaron Denekamp, 2008, “Situation -Based Access Control: Privacy Management Via Modeling of Patient Data Access Scenarios” Journal of Biomedical Informatics.

    Google Scholar 

  • Potter B., Sinclair J. And Till D. 1996 “An Introduction to Formal Specification and Z,” 2nd edition, Prentice Hall.

    Google Scholar 

  • Rayis Osama, 1996, “Software Protection through dedicated Hardware. Ms Thesis Middle East Technical University.

    Google Scholar 

  • Rayis Osama, 1997, “An Adaptable Workflow Environment, Authorization Model Definition,” Technical Report SRDC - Middle East Technical University.

    Google Scholar 

  • Sandhu Ravi and Pierangela Samarati, 1994, “Access Control: Principles and Practice”. IEEE Communications, 32(9):40-48.

    Article  Google Scholar 

  • Sandhu Ravi, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, 1996 “Role-Based Access Control Models,” IEEE Computer, 29(2):38-47.

    Google Scholar 

  • Snekkenes E., 1990, “Authentication in Open Systems”, in Protocol Spec. Testing & Ver., Elsevier Science Publishers.

    Google Scholar 

  • Stallings B., 2007 “Role-Based Access Control in Computer Security” Prentice Hall.

    Google Scholar 

  • Stallings W., Brown L., 2007, “Computer Security: Principles and Practice,” Prentice Hall.

    Google Scholar 

  • Tomur E., Erten Y., 2006 “Application Of Temporal and Spatial Role Based Access Control In 802.11 Wireless Networks,” Computers & Security, Vol. 25, Issue 6.

    Google Scholar 

  • Vijayalakshmi Atluri and Wei-Kuang Huang, 1996, “An Authorization Model for Workflows”, Computer Security - ESORICS 96, Rome.

    Google Scholar 

  • Wordsworth J.B., 1992, “Software Development with Z”, Addison-Wesley.

    Google Scholar 

  • Torvalds L., 2008, “The Linux Kernel,” http://www.kernel.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama A. Rayis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Rayis, O.A. (2010). Formally Specifying Linux Protection. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_12

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics