• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

On Desing of Access Control for Database Systems

Research Project

Project/Area Number 07455163
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報通信工学
Research InstitutionChuo University

Principal Investigator

TSUJII Shigeo  Dept.of Inf.and Sys.Chuo University, Professor, 理工学部, 教授 (50020350)

Co-Investigator(Kenkyū-buntansha) KINOSHITA Hirotsugu  Kanagawa University, Faculty of Eng., Assoc.Prof, 工学部, 助教授 (70202041)
Project Period (FY) 1995 – 1996
Project Status Completed (Fiscal Year 1996)
Budget Amount *help
¥5,400,000 (Direct Cost: ¥5,400,000)
Fiscal Year 1996: ¥1,000,000 (Direct Cost: ¥1,000,000)
Fiscal Year 1995: ¥4,400,000 (Direct Cost: ¥4,400,000)
Keywordsdata base / access control / information security / 隠れチャンネル
Research Abstract

To control the access right of users to data base systems concentrically is one of the approaches for solving to the problem. A systematic model for the approach is called the security model. Typical security models are a mandatory model of the Bell and LaPadula model (summarize BLP) and a discretionaly model using an access matrix. The BLP is defined security levels for information and users. An access right of users is controlled by comparing the security levels of the users and the information. Direction of the information flows are defined by the security levels.
On the other haid, the discretionaly model using an access matrix an access matrix has an advantage to be able to look aroud information flows all over the users. But there is a problem that the indirect information flows are caused by writing any information to the other information, and consequently, confidentiality and integrity for the information are damaged. And if access right is changed, we have a further problem th … More at the access matrix which has been secure before changing access right is not secure. But reports of this type of research have apparently not been published to date.
This research proposes a security model and reification method to detect the indirect information flows and to verify whether information is secure or not. For the security model proposed, a Hierarchical Time Petri Net (H-TPN), which is an extended not of the Hierarchical Petri Net, is defimed. The H-TPN is introduced time parameter and colored tokens in the Hierarchical Petri Net. The information flows in the access matrix are described by the paths on the H-TPN whose places describe users and information. The time parameter is defined in the transitions of the H-TPN.Colored tokens, which are divided into two types, are introduced to reduce complexity of toke'n propagation paths, The one type of the colored tokens describes information to be verified, the others describe information not to be verified. Operation rules between colored tokens are defined.
In the proposed security model, we will show very interesting properties for the security with regard to the time. The properites are a condition to be secure till a certain time and a condition to be secure from a certain time to a certain future time. Less

Report

(3 results)
  • 1996 Annual Research Report   Final Research Report Summary
  • 1995 Annual Research Report
  • Research Products

    (8 results)

All Other

All Publications (8 results)

  • [Publications] 辻井重男 他: "On Ambiguity in Coppersmith′ Attacking Method against NIKS-TAS Schem" 電子情報通信学会 英文論文誌. E79. 66-75 (1996)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] 伊東利哉 他: "A Low Communication Competitive Interactive proof System for Promised Quadratic Residuosity" Journal of Cryptology. No.9. 101-109 (1996)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] 趙 晋輝 他: "Design of Cryptographieally secure elliptic curves over extension fields with CM field method" Proc of PRAGOCRYPTO′96. Part 1. 93-108 (1996)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] Shigeo TSUJI et al: "On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Schem" IEICE TRANSACTIONS. E79. 66-75 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] Toshiya ITOH et al: "A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity" Journal of Cryptology. No.9. 101-109 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] Jinhi CHAO et al: "Desing of Cryptographically secure elliptic curves over extension fields with CM field method" Proc.of PRAGOCRYPTO '96. Part 1. 93-108 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1996 Final Research Report Summary
  • [Publications] 辻井重男 他: "On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme" 電子情報通信学会論文誌(英文誌). E79-A. 66-75 (1996)

    • Related Report
      1995 Annual Research Report
  • [Publications] 辻井重男: "文明構造・文化概念の変容と情報セキュリティ" 電子情報通信学会誌. 79. 98-106 (1996)

    • Related Report
      1995 Annual Research Report

URL: 

Published: 1995-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi