Skip to main content
Article thumbnail
Location of Repository

The functionality-based application confinement model

By Z.C. Schreuders, C. Payne and T. McGill

Abstract

This paper presents the functionality-based application confinement (FBAC) access control model. FBAC is an application-oriented access control model, intended to restrict processes to the behaviour that is authorised by end users, administrators, and processes, in order to limit the damage that can be caused by malicious code, due to software vulnerabilities or malware. FBAC is unique in its ability to limit applications to finely grained access control rules based on high-level easy-to-understand reusable policy abstractions, its ability to simultaneously enforce application-oriented security goals of administrators, programs, and end users, its ability to perform dynamic activation and deactivation of logically grouped portions of a process's authority, its approach to process invocation history and intersection-based privilege propagation, its suitability to policy automation techniques, and in the resulting usability benefits. Central to the model are 'functionalities', hierarchical and parameterised policy abstractions, which can represent features that applications provide; 'confinements', which can model simultaneous enforcement of multiple sets of policies to enforce a diverse range of types of application restrictions; and 'applications', which represent the processes to be confined. The paper defines the model in terms of structure (which is described in five components) and function, and serves as a culmination of our work thus far, reviewing the evaluation of the model that has been conducted to date

Publisher: Springer Verlag
Year: 2013
OAI identifier: oai:researchrepository.murdoch.edu.au:15261
Provided by: Research Repository
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • http://researchrepository.murd... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.