Role locks to prevent illegal information flow among objects

Ryung Chon, Tomoya Enokido, Vlad Wietrzyk, Makoto Takizawa, Leonard Barolli

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    This paper discusses a novel locking protocol to prevent illegal information flow among objects in a role-based access control model. In this paper, we newly define a conflicting relation "a role R1 conflicts with another role R2" to show that illegal information flow may occur if a transaction with R1 is performed before another transaction with R2. Here, we newly introduce a role lock on an object to abort a transaction with R1 if another transaction with R2 had been already performed on the object. Role locks are not released even if transactions issuing the role locks commit. A role lock on an object can be released if information brought into the object got obsolete. We discuss how to release obsolete role locks.
    Original languageEnglish
    Title of host publicationProceedings of the 18th International Conference on Advanced Information Networking and Applications, held in Japan, 29-31 March, 2004: AINA 2004
    PublisherIEEE
    Number of pages6
    ISBN (Print)0769520510
    Publication statusPublished - 2004
    EventInternational Conference on Advanced Information Networking and Applications -
    Duration: 26 Mar 2012 → …

    Conference

    ConferenceInternational Conference on Advanced Information Networking and Applications
    Period26/03/12 → …

    Keywords

    • computer networks
    • role locks
    • data protection
    • computer security
    • access control

    Fingerprint

    Dive into the research topics of 'Role locks to prevent illegal information flow among objects'. Together they form a unique fingerprint.

    Cite this