Click here for full text:
Paradigm Regained: Abstraction Mechanisms for Access Control
Miller, Mark S.; Shapiro, Jonathan S.
Keyword(s): security; access control; capability security; confinement; reachability; lamba abstraction; access abstraction
Abstract: Access control systems must be evaluated in part on how well they enable one to distribute the access rights needed for cooperation, while simultaneously limiting the propagation of rights which would create vulnerabilities. Analysis to date implicitly assumes access is controlled only by manipulating a system's protection state-the arrangement of the access graph. Because of the limitations of this analysis, capability systems have been "proven" unable to enforce some basic policies: revocation, confinement, and the *-properties (explained in the text). In actual practice, programmers build access abstractions-programs that help control access, extending the kinds of access control that can be expressed. Working in Dennis and van Horn's original capability model, we show how abstractions were used in actual capability systems to enforce the above policies. These simple, often tractable programs limited the rights of arbitrarily complex, untrusted programs. When analysis includes the possibility of access abstractions, as it must, the original capability model is shown to be stronger than is commonly supposed. Notes: Copyright Springer-Verlag. To be published in and presented at ASIAN '03, 10-13 December 2003, Mumbai, India
Back to Index