Abstract
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capability lists in this regard, and develop a quantitative feel for the performance overheads and storage requirements. We also explore the issues related to preserving safety properties and trust assumptions during this process. We suggest augmentations to policy specifications that can guarantee these properties in spite of dynamic changes to system state. Using the lessons learned from this exercise, we apply these techniques in the design of dynamic access controls for dynamic environments.
Original language | English (US) |
---|---|
Pages | 231-237 |
Number of pages | 7 |
State | Published - 2003 |
Event | Proceedings of Eighth ACM Symposium on Access Control Models and Technologies - Villa Gallia, Como, Italy Duration: Jun 2 2003 → Jun 3 2003 |
Other
Other | Proceedings of Eighth ACM Symposium on Access Control Models and Technologies |
---|---|
Country/Territory | Italy |
City | Villa Gallia, Como |
Period | 6/2/03 → 6/3/03 |
Keywords
- Access lists
- Capability lists
- Comparison
- Dynamic access control
- Safety
- Trust
ASJC Scopus subject areas
- General Computer Science