What Should a Good Security Model Be?

Download

Download PDF Document
PDF

Author

Marina Bykova

Tech report number

CERIAS TR 2004-38

Entry type

techreport

Abstract

In this article we survey a number of security models -- which range from the first models to newly proposed approaches -- in an attempt to answer the question of what we want our security model to be. The emphasis of this work is not on past or current security models, but rather on new approaches that have been proposed in the literature but have not yet found their way to the end user. The models described in this work provide unusual ways of addressing security needs and may be difficult to employ due to drastic differences from the currently accepted norms. These models, however, may have useful properties that the current systems do not possess, and might provide more efficient ways of securing our systems.

Download

PDF

Date

2004 – 09 – 08

Institution

Purdue University

Key alpha

bykova

Affiliation

Purdue University

Publication Date

2004-09-08

Keywords

security models

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.