A Linux Implementation of Temporal Access Controls
Nguyen, Thuy D.
Irvine, Cynthia E.
MetadataShow full item record
Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks for temporal access control logic. In addition, a set of utilities was modified to be TIFPS-aware. These tools permit users to view and manage the temporal attributes associated with their files and directories. Functional, performance, and concurrency testing were conducted. The ability of TIFPS to grant or revoke access in the future, as well to limit access to specific time intervals enhances traditional information control and sharing.
Showing items related by title, author, creator and subject.
Chiang, Ken H. (Monterey, California. Naval Postgraduate School, 2006-09);Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents ...
Tardy, Matthew L. (Monterey, California. Naval Postgraduate School, 2005-06);The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access ...
Afinidad, Francis B.; Irvine, Cynthia E.; Nguyen, Thuy D.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 2005-11); NPS-CS-06-002Time is often a critical factor for making decisions regarding access to information. To manage and protect critical data in this regard implies that information systems need to enforce temporal security policies. However, ...