Flow Based Interpretation of Access Control: Detection of Illegal Information Flows

Author(s):  
Mathieu Jaume ◽  
Valérie Viet Triem Tong ◽  
Ludovic Mé
Author(s):  
R.A. Dorokhin ◽  
O.A. Bezrodnykh ◽  
S.N. Smirnov ◽  
V.A. Maystrenko

The paper considers the task of studying the features of the protection system of the operating system Astra linux 1.6 SE (Further OS Astra 1.6 SE). The basic principles of access control, functional features of protection modules, settings of some configuration files of the operating system, as well as types and features of classification marks are revealed. The result of this work is the proposal for the implementation of the possibility of configuring the basic access control mechanisms without using a graphical shell, the study of the principle of operation of these mechanisms, as well as the use of the features of kernel modules, configuration files for the design of a security system for computer facilities by information protection units. This operating system has a specific feature of the structure of the security system, since it includes mechanisms for mandatory access control, allowing access to be denied or allowed depending on the user's authority. The exchange and processing of information occurs with the use of classification labels, which make it possible to delimit information flows of different mandated contexts. These labels are written in accordance with GOST R 58256-2018 “Information security. Information flow control in the information system. Format of classification marks”. The paper analyzes traffic in different mandated sessions, and also considers the behavior of information flows regarding interaction in a network of computers with the installed OS Astra linux 1.6 SE and the security system configured on it. In this case, the exchange of data will occur both with users in the same sessions and in different ones that differ between computers.


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

2012 ◽  
Vol 1 (7) ◽  
pp. 78-79
Author(s):  
Anitha Chepuru ◽  
◽  
Dr.K.Venugopal Rao ◽  
Amardeep Matta
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document