TAN Liang, ZHOU Ming-Tian. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis[J]. Journal of Electronic Science and Technology, 2006, 4(3): 274-280.
Citation: TAN Liang, ZHOU Ming-Tian. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis[J]. Journal of Electronic Science and Technology, 2006, 4(3): 274-280.

Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

Funds: 

Supported by the National 863 Broad Band VPN Project (No.863-104-03-01)

More Information
  • Author Bio:

    TAN Liang research interests include information security, software engineering, and so on.

  • Received Date: 2006-06-29
  • Publish Date: 2006-09-24
  • DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.
  • Related Articles

    [1]Yi-Hui Chen, Chi-Shiang Chan, Yuan-Yu Tsai. Access Control Mechanism for Blog Posts with Fine-Grained Ability Using Simple Operations[J]. Journal of Electronic Science and Technology, 2017, 15(2): 194-198. DOI: 10.11989/JEST.1674-862X.6061012
    [2]Nyamsuren Vaanchig, Wei Chen, Zhi-Guang Qin. Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service[J]. Journal of Electronic Science and Technology, 2017, 15(1): 90-98. DOI: 10.11989/JEST.1674-862X.5121616
    [3]Chi-Lun Liu. Access Control Policy Analysis and Access Denial Method for Cloud Services[J]. Journal of Electronic Science and Technology, 2013, 11(2): 176-180. DOI: 10.3969/j.issn.1674-862X.2013.02.009
    [4]Jin-He Wang, Nan Zhang, and Qing-Gang He. Experimental Study on Real-Time Control System Testing[J]. Journal of Electronic Science and Technology, 2009, 7(4): 399-403.
    [5]Yong-Bin Yu, Hong-Bin Zhang, Zhu-Sheng Kang, Xiao-Feng Liao, Jue-Bang Yu. Chaos and Its Impulsive Control in Chua's Oscillator via Time-Delay Feedback[J]. Journal of Electronic Science and Technology, 2008, 6(1): 56-60.
    [6]Yu-Ping Zhang, Hong Zhu, Shou-Ming Zhong. Robust Non-Fragile Guaranteed Cost Control for Nonlinear Time Delay Discrete-Time Systems Based on T-S Model[J]. Journal of Electronic Science and Technology, 2007, 5(2): 153-158.
    [7]SHE Jun, JIAO Shou-jiang, LUO Xiao-yuan, GUAN Xin-ping. Controller Design for a Teleoperation System with Time Delay[J]. Journal of Electronic Science and Technology, 2005, 3(4): 348-353.
    [8]LI Jian-hua, WANG Sun-an. Adaptive Trajectory Tracking Control of Wheeled Mobile Robots with Nonholonomic Constraint[J]. Journal of Electronic Science and Technology, 2005, 3(4): 342-347,353.
    [9]WU Wen-jie, QIN Dong-xing, DONG Wei. Research on Time-Synchronization-Based Test and Control System of Aeroengine[J]. Journal of Electronic Science and Technology, 2004, 2(4): 64-67.
    [10]LIU Xie, LIU Xin-song, YANG Feng, BAI Ying-jie. Design and Implement an Novel File Access Prediction Model in Linux[J]. Journal of Electronic Science and Technology, 2004, 2(2): 36-41.
  • Catalog

      Article Metrics

      Article views (355) PDF downloads (42) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return