lenge as well as an opportunity: a challenge, because
the sub-models have to meet closeness conditions,
and an opportunity, because human knowledge is ex-
ploited to tackle the computational complexity of the
analysis.
While in general safety properties of HRU secu-
rity models are known to be undecidable, the method
allows for safety analysis in many real-world scenar-
ios. Excerpts from the security policy of a real-world
enterprise resource planning scenario and a discus-
sion of MLS models support this claim.
REFERENCES
Ammann, P. E. and Sandhu, R. S. (1991). Safety Anal-
ysis for the Extended Schematic Protection Model.
In Proc. IEEE Symposium on Security and Privacy.
IEEE Press.
Bell, D. E. and LaPadula, L. J. (1973). Secure Computer
Systems: Mathematical Foundations (Vol.I). Techni-
cal Report AD 770 768, MITRE.
Brewer, D. F. and Nash, M. J. (1989). The Chinese Wall
Security Policy. In Proc. IEEE Symposium on Security
and Privacy. IEEE Press.
Bryce, C., K¨uhnhauser, W. E., Amouroux, R., and Lop´ez,
M. (1997). CWASAR: A European Infrastructure for
Secure Electronic Commerce. Journal of Computer
Security, IOS Press.
Common3.1 (2009). Common Criteria for Information
Technology Security Evaluation, Version 3.1, Revision
3.
Crampton, J. and Khambhammettu, H. (2008). Delegation
in Role-based Access Control. Int. Journal of Infor-
mation Security.
Denning, D. E. (1976). A Lattice Model of Secure Informa-
tion Flow. Communications of the ACM.
Efstathopoulos, P. and Kohler, E. (2008). Manageable Fine-
Grained Information Flow. In Proc. 2008 EuroSys
Conference. ACM SIGOPS.
Goguen, J. and Meseguer, J. (1982). Security Policies and
Security Models. In Proc. IEEE Symposium on Secu-
rity and Privacy. IEEE.
Halfmann, U. and K¨uhnhauser, W. E. (1999). Embedding
Security Policies Into a Distributed Computing Envi-
ronment. Operating Systems Review.
Harrison, M. A. and Ruzzo, W. L. (1978). Monotonic Pro-
tection Systems. In DeMillo, R., Dobkin, D., Jones,
A., and Lipton, R., editors, Foundations of Secure
Computation. Academic Press.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1975).
On Protection in Operating Systems. Operating Sys-
tems Review, 5th Symposium on Operating Systems
Principles.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. Communications of
the ACM.
Kleiner, E. and Newcomb, T. (2006). Using CSP to Decide
Safety Problems for Access Control Policies. Techni-
cal Report RR-06-04, Oxford University Computing
Laboratory.
Kleiner, E. and Newcomb, T. (2007). On the Decidabil-
ity of the Safety Problem for Access Control Poli-
cies. Electronic Notes in Theoretical Computer Sci-
ence (ENTCS).
Krohn, K. and Rhodes, J. (1965). Algebraic Theory of Ma-
chines. I. Prime Decomposition Theorem for Finite
Semigroups and Machines. Transactions of the Amer-
ican Mathematical Society.
Li, N., Mitchell, J. C., and Winsborough, W. H. (2005). Be-
yond Proof-of-compliance: Security Analysis in Trust
Management. JACM.
Lipton, R. and Snyder, L. (1978). On Synchronization and
Security. In DeMillo, R., Dobkin, D., Jones, A., and
Lipton, R., editors, Foundations of Secure Computa-
tion. Academic Press.
Loscocco, P. A. and Smalley, S. D. (2001). Integrating Flex-
ible Support for Security Policies into the Linux Oper-
ating System. In Cole, C., editor, Proc. 2001 USENIX
Ann. Techn. Conference.
Pittelli, P. A. (1988). The Bell-LaPadula Computer Security
Model Represented as a Special Case of the Harrison-
Ruzzo-Ullman Model. In Proc. National Computer
Security Conference. NBS/NCSC.
Sandhu, R. S. (1992). The Typed Access Matrix Model.
In Proc. IEEE Symposium on Security and Privacy.
IEEE.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
IEEE Computer.
SAP AG (2009). SAP History. http://www.sap.com/.
Vimercati, S. D. C. d., Samarati, P., and Jajodia, S. (2005).
Policies, Models, and Languages for Access Con-
trol. In 4th Int. Workshop on Databases in Networkes
Information Systems, Volume 3433/2005 of LNCS.
Springer.
SECRYPT 2010 - International Conference on Security and Cryptography
58