Implementing Security Policies Using the Safe Areas of Computation Approach
André L. M. dos Santos &
Richard A. Kemmerer
University of California, Santa Barbara
An approach that can be used to protect Internet transactions, called Safe Areas of Computation, was described in an earlier ACSAC paper. This paper describes the access control lists used by the Safe Areas of Computation approach, the operations on these access control lists supported by the approach, and how the access control lists can be customized for implementing many different security policies. This paper also describes example policies that can be used to protect Digital Libraries and Online Bank services. The paper uses the bank services as an example of how the generic security policies supported by the SAC approach can be composed.
Read Paper (in PDF)