Role locks to prevent illegal information flow among objects

Ryung Chon, Tomoya Enokido, Vlad Wietrzyk, Makoto Takizawa, Leonard Barolli

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[This paper discusses a novel locking protocol to prevent illegal information flow among objects in a role-based access control model. In this paper, we newly define a conflicting relation “a role R1 conflicts with another role R2” to show that illegal information flow may occur if a transaction with R1 is performed before another transaction with R2. Here, we newly introduce a role lock on an object to abort a transaction with R1 if another transaction with R2 had been already performed on the object. Role locks are not released even if transactions issuing the role locks commit. A role lock on an object can be released if information brought into the object got obsolete. We discuss how to release obsolete role locks.]]
    Original languageEnglish
    Title of host publicationProceedings of the 18th International Conference on Advanced Information Networking and Applications, held in Japan, 29-31 March, 2004: AINA 2004
    PublisherIEEE
    Number of pages6
    ISBN (Print)0769520510
    Publication statusPublished - 2004
    EventInternational Conference on Advanced Information Networking and Applications -
    Duration: 26 Mar 2012 → …

    Conference

    ConferenceInternational Conference on Advanced Information Networking and Applications
    Period26/03/12 → …

    Keywords

    • computer networks
    • role locks
    • data protection
    • computer security
    • access control

    Fingerprint

    Dive into the research topics of 'Role locks to prevent illegal information flow among objects'. Together they form a unique fingerprint.

    Cite this