KR920020324A - Access Control Method for Multi Class Confidential Data Protection - Google Patents

Access Control Method for Multi Class Confidential Data Protection Download PDF

Info

Publication number
KR920020324A
KR920020324A KR1019910006758A KR910006758A KR920020324A KR 920020324 A KR920020324 A KR 920020324A KR 1019910006758 A KR1019910006758 A KR 1019910006758A KR 910006758 A KR910006758 A KR 910006758A KR 920020324 A KR920020324 A KR 920020324A
Authority
KR
South Korea
Prior art keywords
access control
subject
access
user
confidentiality level
Prior art date
Application number
KR1019910006758A
Other languages
Korean (ko)
Other versions
KR930004434B1 (en
Inventor
이철원
홍기융
박태규
김대호
Original Assignee
경상현
재단법인 한국전자통신연구소
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 경상현, 재단법인 한국전자통신연구소 filed Critical 경상현
Priority to KR1019910006758A priority Critical patent/KR930004434B1/en
Publication of KR920020324A publication Critical patent/KR920020324A/en
Application granted granted Critical
Publication of KR930004434B1 publication Critical patent/KR930004434B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

내용 없음No content

Description

다중 등급기밀 데이타 보호용 액세스 제어방법Access Control Method for Multi Class Confidential Data Protection

본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is an open matter, no full text was included.

제1도는 본 발명이 적용되는 하드웨어 시스템의 구성도,1 is a configuration diagram of a hardware system to which the present invention is applied;

제2도는 본 발명에 의한 액세스 제어방법의 소프트웨어 구성도,2 is a software configuration diagram of an access control method according to the present invention;

제5도는 본 발명에 의한 액세스 제어방법의 흐름도.5 is a flowchart of an access control method according to the present invention.

Claims (5)

주기억장치(2), 상기 주기억장치(2)에 연결된 보조기억장치(1), 상기 주기억장치(2)에 연결된 명령어 해석수단(6), 상기 명령어 해석수단(6)에 연결된 DAC(Discretionary Access Control) 비교수단(5), 상기 DAC 비교수단(5)과 명령어 해석수단(6)에 연결된 MLS(Milti-Level Security)액세스 제어수단(3), 상기 주기억장치(2)와 MLS 액세스 제어수단(3)에 연결된 명령어 위치 주소 계산수단(4), 및 상기 명령어 해석수단(6)과 보조기억장치(1)에 연결된 화일 액세스 수단(7)을 포함하여 구성된 컴퓨터 시스템의 다중 등급기밀 데이타 보호용 액세스 제어방법에 있어서; 상기 컴퓨터 시스템을 사용하려고 하는 사용자가 상기 컴퓨터 시스템으로의 진입을 위한 로그인 작업을 수행하는 제1단계(30, 31, 32, 33, 34, 35), 상기 사용자가 원하는 자원을 액세스하고자 하는 명령어를 입력시키고 상기 입력된 명령어를 실행하기 위한 주체를 생성하는 제2단계(36,37)상기 주체에 대한 액세스 제어 결정을 위해 DAC 조사를 수행하여 액세스 제어 특성의 만족 여부를 검색하는 제3단계(38), 및 상기 DAC 조사단계에서 액세스 제어특성을 만족하면 MAC(Mandatory Access Control)조사를 수행하여 액세스 제어특성의 만족 여부를 검색하여 만족하면 사용자가 원하는 개체를 액세스 하는 제4단계(39, 40)에 의해 수행되는 것을 특징으로 하는 다중등급기밀 데이타 보호용 액세스 제어방법.Main memory 2, auxiliary memory 1 connected to main memory 2, command interpreting means 6 connected to main memory 2, and Discretionary Access Control connected to command interpreting means 6 ) A comparison means (5), a Mil-Level Security (MLS) access control means (3) connected to the DAC comparison means (5) and an instruction interpreter (6), and the main memory device (2) and an MLS access control means (3). Method for controlling access to multi-class confidential data of a computer system comprising a command location address calculating means (4) connected to the command line), and a file access means (7) connected to the command interpreting means (6) and the auxiliary storage device (1). To; A first step (30, 31, 32, 33, 34, 35) for the user who wants to use the computer system to perform a login operation for entering the computer system, the command to access the resources desired by the user A second step (36,37) of inputting and generating a subject for executing the input command (36,37) a third step (38) of searching whether the access control characteristic is satisfied by performing a DAC investigation to determine an access control for the subject And, if the access control characteristic is satisfied in the DAC investigation step, performing a mandatory access control (MAC) investigation to search whether the access control characteristic is satisfied, and if the access control characteristic is satisfied, the fourth step (39, 40). The access control method for multi-class confidential data protection, characterized in that performed by. 제1항에 있어서, 상기 DAC 조사 및 MAC 조사단계에서 액세스 제어특성을 만족하지 못하면 사용자가 원하는 객체의 액세스를 거절하고 액세스 제어 위반사항을 기록하는 단계(41, 42)를 더 포함하여 수행되는 것을 특징으로 하는 다중등급기밀 데이타 보호용 액세스 제어방법.The method of claim 1, further comprising the steps 41 and 42 of denying access to an object desired by the user and recording an access control violation if the access control characteristic is not satisfied in the DAC investigation and MAC investigation. An access control method for protecting multiclass confidential data. 제1항 또는 제2항에 있어서, 상기 로그인 작업 수행단계는 상기 사용자가 사용자 식별자와 패스워드를 입력시키고 상기 입력된 패스워드와 시스템내의 암호화된 패스워드와의 일치형 여부를 검새고하는 단계(30, 31), 상기 패스워드가 일치하면 상기 사용자가 사용자 기밀등급을 입력시키고 상기 입력된 사용자 기밀등급이 사용자 신원허가 범위내에 존재하는지의 여부를 검색하는 단계(32, 33), 및 상기 사용자 기밀등급이 사용자 신원허가 범위내에 존재하면 쉘(shell)프로세스를 실행하는 단계(34)에 의해 수행되는 것을 특징으로 하는 다중등급기밀 데이타 보호용 액세스 제어방법.The method as claimed in claim 1 or 2, wherein the performing of the login operation includes the step of the user inputting a user identifier and a password and checking whether the input password matches the encrypted password in the system (30, 31). ), If the password matches, the user enters a user confidentiality level and retrieves whether or not the entered user confidentiality level is within a user identity range (32, 33), and the user confidentiality level is a user identity; And accessing the shell process if present within the permission range. 제1항 또는 제2항에 있어서, 상기 DAC 조사 단계의 액세스 제어특성의 만족여부는 주체의 액세스 요구가 판독인 경우 상기 액세스의 대상 객체에 대한 정의, 주체의 액세스 요구가 실행인 경우 상기 실행 액세스의 대상 객체에 대한 정의, 및 주체의 액세스 요구가 기록인 경우 상기 기록 액세스의 대상 객체에 대한 정의의 여부에 따라 결정되는 것을 특징으로 하는 다중등급기밀 데이타 보호용 액세스 제어방법.The method according to claim 1 or 2, wherein the satisfaction of the access control characteristic of the DAC checking step is defined for the object to be accessed when the access request of the subject is read, and the execution access when the access request of the subject is execution. And a definition for the target object of the subject, and if the subject's access request is a record, whether or not the subject object is defined for the target object of the record access. 제1항 또는 제2항에 있어서, 상기 MAC 조사단계의 액세스 제어특성의 만족여부는 주체의 액세스 요구가 판독인 경우 상기 주체의 기밀등브이 객체의 기밀등급보다 크거나 같은지의 여부,주체의 액세스 요구가 실행인경우 상기 주체의 기밀등급이 객체의 기밀등급보다 크거나 같은지의 여부, 및 주체의 액세스요구가 기록인 경우 객체의 기밀등급이 주체의 기밀등급보다 크거나 같은지의 여부에 따라 결정되는 것을 특징으로 하는 다중등급기밀 데이타 보호용 액세스 제어방법.The method according to claim 1 or 2, wherein whether the access control characteristic of the MAC checking step is satisfied is whether or not the subject's confidential object is greater than or equal to the object's confidentiality level when the subject's access request is read. Whether the subject's confidentiality level is greater than or equal to the object's confidentiality level if the request is an implementation, and if the subject's access request is a record, whether the object's confidentiality level is greater than or equal to the subject's confidentiality level. Access control method for multi-class confidential data protection, characterized in that. ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.※ Note: The disclosure is based on the initial application.
KR1019910006758A 1991-04-26 1991-04-26 Data accessing method KR930004434B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1019910006758A KR930004434B1 (en) 1991-04-26 1991-04-26 Data accessing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1019910006758A KR930004434B1 (en) 1991-04-26 1991-04-26 Data accessing method

Publications (2)

Publication Number Publication Date
KR920020324A true KR920020324A (en) 1992-11-21
KR930004434B1 KR930004434B1 (en) 1993-05-27

Family

ID=19313738

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019910006758A KR930004434B1 (en) 1991-04-26 1991-04-26 Data accessing method

Country Status (1)

Country Link
KR (1) KR930004434B1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100463842B1 (en) * 2001-12-27 2004-12-29 한국전자통신연구원 Apparatus for managing key in afile security system and method for managing security key
KR100630050B1 (en) * 1998-12-28 2007-04-25 삼성전자주식회사 Community Management Method of SNP Network System
KR100882901B1 (en) * 2007-07-23 2009-02-10 고려대학교 산학협력단 Method Of Setting Security Policy In Home Network System
WO2020246711A1 (en) * 2019-06-03 2020-12-10 김덕우 File system protection apparatus and method in auxiliary storage device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100630050B1 (en) * 1998-12-28 2007-04-25 삼성전자주식회사 Community Management Method of SNP Network System
KR100463842B1 (en) * 2001-12-27 2004-12-29 한국전자통신연구원 Apparatus for managing key in afile security system and method for managing security key
KR100882901B1 (en) * 2007-07-23 2009-02-10 고려대학교 산학협력단 Method Of Setting Security Policy In Home Network System
WO2020246711A1 (en) * 2019-06-03 2020-12-10 김덕우 File system protection apparatus and method in auxiliary storage device

Also Published As

Publication number Publication date
KR930004434B1 (en) 1993-05-27

Similar Documents

Publication Publication Date Title
US7290279B2 (en) Access control method using token having security attributes in computer system
US9112863B2 (en) Method, program product and server for controlling a resource access to an electronic resource stored within a protected data environment
EP1058873B1 (en) File access control in a multi-protocol file server
US5469556A (en) Resource access security system for controlling access to resources of a data processing system
US4713753A (en) Secure data processing system architecture with format control
US5113442A (en) Method and apparatus for providing access control in a secure operating system
US7249379B2 (en) Method and apparatus for implementing process-based security in a computer system
KR101382222B1 (en) System and method for mobile data loss prevention which uses file system virtualization
US20020166053A1 (en) Method, system, and program for encrypting files in a computer system
KR20110098721A (en) Method and apparatus for providing access to files based on user identity
US20080141338A1 (en) Secure policy description method and apparatus for secure operating system
JPH0388052A (en) Secrecy protection processing system
JPH0582098B2 (en)
US20040093525A1 (en) Process based security tai building
CN115758420B (en) File access control method, device, equipment and medium
KR20020016711A (en) Mandatory Object Access Control Method Using Multi-Level Security, and Computer Readable Recording Medium Having thereon Programmed Mandatory Object Access Control Method Using Multi-Level Security
KR920020324A (en) Access Control Method for Multi Class Confidential Data Protection
US7454788B2 (en) Method for adding and enforcing enhanced authorization policy on devices in computer operation systems
JP2000502825A5 (en)
RU2134931C1 (en) Method of obtaining access to objects in operating system
RU2583759C1 (en) System for controlling access to files based on automatic markup thereof with arrangement of account data of access subject to created file
KR20030090568A (en) System for protecting computer resource and method thereof
RU2630163C1 (en) Method of control of files access
RU2234123C1 (en) System for setting access privileges for file objects
US11783095B2 (en) System and method for managing secure files in memory

Legal Events

Date Code Title Description
A201 Request for examination
G160 Decision to publish patent application
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 19980313

Year of fee payment: 6

LAPS Lapse due to unpaid annual fee