SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Computer related risks
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Proceedings of the 1998 workshop on New security paradigms
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Executive Briefing: Advances in Concurrency Control and Transaction Processing
Executive Briefing: Advances in Concurrency Control and Transaction Processing
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Design, Implementation, and Evaluation of a Repairable Database Management System
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
Hi-index | 0.01 |
While security is a critical component of information systems, at times it can be frustrating for end users. Security systems exist to minimise the risks of allowing users to access and modify data, but rarely do they consider the risks of not granting access. This paper describes an access control system which is optimistic, i.e. it assumes accesses are legitimate, and allows audit and recovery of the system when they are not. The concepts of well-formed and partially-formed transactions as mechanisms for constraining pessimistic and optimistic accesses is briefly described, and the paper details a prototype implementation for the Solaris operating system which provides a reference monitor for enforcement of both these transactions.