Proposal of the hierarchical file server groups for implementing mandatory access control

Taketoshi Sakuraba, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

An accessible implementation of MAC for file access is proposed. Instead of traditional but unfamiliar MAC aware tools such as secure-OSs, the security enforcement mechanism of our proposal is FSG (file server group) which is structured so that they reflect a security policy of the organization. Using ordinal file servers, it is accessible to the most of commercial office environment. We also propose the use of FCA (formal concept analysis), a technology for knowledge extraction, to derive the structure of FSG for information flow enforcement. An advantage of use of FCA is that it directly produces configuration parameters such as access points of users as the knowledge extracted from organizational security policy. The configuration of the file server group is easy to understand, and the management cost of FSG is lower than that of the ordinary flat structured file servers.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Pages639-644
Number of pages6
DOIs
Publication statusPublished - Oct 26 2012
Event6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 - Palermo, Italy
Duration: Jul 4 2012Jul 6 2012

Publication series

NameProceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012

Other

Other6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
CountryItaly
CityPalermo
Period7/4/127/6/12

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Communication

Fingerprint Dive into the research topics of 'Proposal of the hierarchical file server groups for implementing mandatory access control'. Together they form a unique fingerprint.

Cite this