Type enforcement

Type enforcement

The concept of type enforcement (TE) in the field of information technology is related to access control. Implementing TE, gives priority to “mandatory access control” (MAC) over “discretionary access control” (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached security context. A security context in a domain is defined by a domain security policy. In Linux security module (LSM) as SELinux, the security context is an extended attribute. Type enforcement implementation is a prerequisite for MAC, and a first step before “Multi-Level Security” (MLS) or its ersatz “Multi categories Security” (MCS). It is a complement of “role based access control” (RBAC).

Control

Type enforcement implies fine grained control over the operating system, not only to have control over processes execution, but also on “domain transition” or authorization scheme. This is why it is best implemented as a kernel module, as is the case with SELinux. Using Type Enforcement is a way to implement the FLASK architecture.

Access

Using type enforcement, users may (as in Microsoft Active Directory) or may not (as in SELinux) be associated to a domain, although original type enforcement model implies so. It is always necessary to define a TE access matrix containing rules about clearance granted to given security context, or subjects rights over objects according to an authorization scheme.

ecurity

Practically, type enforcement, evaluate a set of rules from the source security context of a subject, against a set of rules from the target security context of the object. A clearance decision occurs depending on the TE access description (matrix…). Then, DAC or others access control (MLS / MCS, …) apply.

History

Type enforcement was introduced in the Secure Ada Target architecture in the late 1980s. A full implementation was developed in the [http://www.cryptosmith.com/archives/179 LOCK] system. The Sidewinder Internet Firewall was implemented on a custom version of Unix that incorporated type enforcement.

A variant called "domain type enforcement" was developed in the Trusted MACH system.

The original type enforcement model stated that labels should be attached to subject and object: a “domain label” for a subject and a “type label ” for an object. This implementation mechanism was improved by the FLASK architecture, substituting complex structures and implicit relationship. Also, the original TE access matrix was extended to others structures: lattice-based, history-based, environment-based, policy logic… This is a matter of implementation of TE by the various operating systems. In SELinux, TE implementation does not internally distinguish TE-domain from TE-types. It should be considered a weakness of TE original model to specify detailed implementation aspects such as labels and matrix, especially using the terms “domain” and “types” which have others, more generic, wide acceptance.

References

* P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. " [http://www.jya.com/paperF1.htm The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments] ". In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, October 1998. [http://csrc.nist.gov/nissc/1998/proceedings/paperF1.pdf]
* [http://www.cryptosmith.com/archives/179 LOCK - A trusted computing system]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Type Enforcement — Unter Type Enforcement versteht man eine Form der Implementierung eines MAC Systems. Hierbei werden bei der Definition der Zugriffsregeln nicht die zu schützenden Ressourcen selbst, sondern ein Typ, der diesen zugewiesen wurde, angegeben.… …   Deutsch Wikipedia

  • Type safety — In computer science, type safety is a property of some programming languages that is defined differently by different communities, but most definitions involve the use of a type system to prevent certain erroneous or undesirable program behavior… …   Wikipedia

  • Law enforcement in the United Kingdom — Crime in the UK · Terrorism in the UK Topics …   Wikipedia

  • Law enforcement in New York — City · Westchester County · …   Wikipedia

  • Law enforcement agency — (LEA) is a term used to describe either an organisation that enforces the laws of one or more governing bodies, or an organisation that actively and directly assists in the enforcement of laws. In doing so, the LEA assists the governing bodies to …   Wikipedia

  • Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… …   Universalium

  • Law Enforcement Aviation Coalition, Inc. — The Law Enforcement Aviation Coalition, Inc. is a non profit 501(c) 3 charitable organization. History The [http://www.whpd.org Winthrop Harbor Police Department] (WHPD) is the founding agency and coordinator of the [http://www.airsupport.org Law …   Wikipedia

  • Traffic enforcement camera — Gatso speed camera A traffic enforcement camera (also red light camera, road safety camera, road rule camera, photo radar, photo enforcement, speed camera, Gatso) is an automated ticketing machine. It may include a camera which may be mounted… …   Wikipedia

  • Specialist law enforcement agency — A specialist law enforcement agency is a law enforcement agency which specialises in the types of laws it enforces, or types of activities it undertakes, or geography it enforces laws in, or these in combination.The specialisation may be imposed… …   Wikipedia

  • Baton (law enforcement) — Truncheon redirects here. For the British submarine, see HMS Truncheon (P353). Nightstick redirects here. For the sludge metal band, see Nightstick (band). For the Transformers character, see Nightstick (Transformers). Old police baton A… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”