A Model for Temporal Interval Authorizations

Download
Author
Levin, Timothy E.
Irvine, Cynthia E.
Nguyen, Thuy D.
Afinidad, Francis B.
Date
2006-01-00Metadata
Show full item recordAbstract
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and objects, in a "time interval access graph." The time interval access graph is used to define constraints on the temporal relations between subjects, objects, and the time of access. Interval algebra is used to precisely define and analyze the time interval access graph, and to specify the evaluation of access requests.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
A Linux Implementation of Temporal Access Controls
Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E. (A Linux Implementation of Temporal Access Controls, 2007-06-01);Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval ... -
A prototype implementation of a time interval file protection system in Linux
Chiang, Ken H. (Monterey, California. Naval Postgraduate School, 2006-09);Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents ... -
A time interval memory protection system
Afinidad, Francis B.; Irvine, Cynthia E.; Nguyen, Thuy D.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 2005-11); NPS-CS-06-002Time is often a critical factor for making decisions regarding access to information. To manage and protect critical data in this regard implies that information systems need to enforce temporal security policies. However, ...