AAU Student Projects - visit Aalborg University's student projects portal
A master's thesis from Aalborg University
Book cover


The Timed Decentralized Label Model

Translated title

Tidsbaseret Decentraliseret Label Model

Authors

;

Term

4. term

Education

Publication year

2015

Submitted on

Pages

65

Abstract

Inden for it-sikkerhed undersøger man, hvordan information bevæger sig i systemer (informationsflow), og hvem der må få adgang til den (adgangskontrol). Tidsaspektet—hvem der må hvad, og hvornår—har dog fået begrænset opmærksomhed, og der fandtes ingen modeller, der kombinerer informationsflow og adgangskontrol med eksplicit tid. Dette speciale udvikler Timed Decentralized Label Model (TDLM), som indfører tid i mærkning af data og håndhævelse af politikker, så rettigheder kan ændre sig over tid. TDLM er formelt defineret ved hjælp af timed automata, en måde at beskrive systemer med ure og tidsbegrænsninger på. Der findes endnu ingen softwareimplementering af TDLM. Der er behov for videre arbejde for at bygge en fuld implementering, f.eks. som et nyt programmeringssprog eller som en udvidelse af eksisterende værktøjer til de underliggende modeller. Værktøjer som UPPAAL kan bruges til statisk verifikation og dermed kontrollere, at sikkerhedspolitikkerne håndhæves som tilsigtet.

In computer security, researchers study how information moves within systems (information flow) and who is allowed to access or change it (access control). The time dimension—who can do what, and when—has received little attention, and there were no models that combine information flow and access control with explicit timing. This thesis develops the Timed Decentralized Label Model (TDLM), which brings time into data labeling and policy enforcement so that permissions can change over time. TDLM is formally defined using timed automata, a way to describe systems that rely on clocks and timing constraints. There is not yet a software implementation of TDLM. Further work is needed to build a complete implementation, for example as a new programming language or as an extension of existing tools for the underlying models. Tools such as UPPAAL could support static verification to check that the specified security policies are enforced as intended.

[This abstract was generated with the help of AI]