Abstract
![CDATA[This paper discusses a novel locking protocol to prevent illegal information flow among objects in a role-based access control model. In this paper, we newly define a conflicting relation “a role R1 conflicts with another role R2” to show that illegal information flow may occur if a transaction with R1 is performed before another transaction with R2. Here, we newly introduce a role lock on an object to abort a transaction with R1 if another transaction with R2 had been already performed on the object. Role locks are not released even if transactions issuing the role locks commit. A role lock on an object can be released if information brought into the object got obsolete. We discuss how to release obsolete role locks.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the 18th International Conference on Advanced Information Networking and Applications, held in Japan, 29-31 March, 2004: AINA 2004 |
Publisher | IEEE |
Number of pages | 6 |
ISBN (Print) | 0769520510 |
Publication status | Published - 2004 |
Event | International Conference on Advanced Information Networking and Applications - Duration: 26 Mar 2012 → … |
Conference
Conference | International Conference on Advanced Information Networking and Applications |
---|---|
Period | 26/03/12 → … |
Keywords
- computer networks
- role locks
- data protection
- computer security
- access control