Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers

被引:4
|
作者
Hirano, Manabu [1 ]
Shinagawa, Takahiro [2 ]
Eiraku, Hideki [2 ]
Hasegawa, Shoichi [2 ]
Omote, Kazumasa [2 ]
Tanimoto, Koichi [2 ]
Horie, Takashi [2 ]
Kato, Kazuhiko [2 ]
Okuda, Takeshi [3 ]
Kawai, Eiji [3 ]
Yamaguchi, Suguru [3 ]
机构
[1] Toyota Natl Coll Technol, Dept Informat & Comp Engn, 2-1 Sakae, Aichi, Japan
[2] Univ Tsukuba, Grad Sch ISE, Dept Comp Sci, Ibaraki, Japan
[3] Nara Inst Sci & Technol, Grad Sch Informat Sci, Nara, Japan
关键词
D O I
10.1109/APSCC.2008.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, as the data processed by governmental or commercial organizations increases, cases involving information leak have risen. It is difficult to control information on many distributed end-point computers using conventional security mechanisms. Therefore, we have been proposed a novel secure VMM (Virtual Machine Monitor) architecture which is used as a foundation of security policy enforcement on distributed computers. This paper especially introduces Role-based Access Control (RBAC) to the ID management framework in a secure VMM system. Our proposal will reduce costs for distributed policies updates. Proposed RBAC mechanism employs attribute certificates (ACs) to handle user's roles. This paper shows design and prototype implementation based on PKI-based ID card and proven open source VMM software, QEMU.
引用
收藏
页码:1225 / +
页数:2
相关论文
共 50 条
  • [41] Resiliency Analysis of Role-Based Access Control via Constraint Enforcement and Mathematical Programming
    Yang, Benyuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (07): : 4089 - 4100
  • [42] Configuring role-based access control to enforce Chinese Wall policy
    Zhao, QS
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 206 - 209
  • [43] Policy Analysis for Self-administrated Role-Based Access Control
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 432 - 447
  • [44] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [45] Reasoning about security: A logic and a decision method for role-based access control
    Massacci, F
    QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
  • [46] A framework for implementing role-based access control using CORBA security service
    Beznosov, K
    Deng, Y
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30
  • [47] Research on Security Status Recovery in Temporal Role-Based Access Control System
    Yu Wanjun
    Wang Yong
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
  • [48] Security enhancement of a flexible payment scheme and its role-based access control
    Chang, Chin-Chen
    Cheng, Yi-Fang
    Lin, Iuon-Chang
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 457 - +
  • [49] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [50] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439