Research Article
A Privilege Separation Method for Security Commercial Transactions
515 downloads
@INPROCEEDINGS{10.1007/978-3-642-23602-0_17, author={Yasha Chen and Jun Hu and Xinmao Gai and Yu Sun}, title={A Privilege Separation Method for Security Commercial Transactions}, proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, proceedings_a={E-FORENSICS}, year={2012}, month={10}, keywords={privilege separation fraud management security commercial transactions formal method}, doi={10.1007/978-3-642-23602-0_17} }
- Yasha Chen
Jun Hu
Xinmao Gai
Yu Sun
Year: 2012
A Privilege Separation Method for Security Commercial Transactions
E-FORENSICS
Springer
DOI: 10.1007/978-3-642-23602-0_17
Abstract
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
Copyright © 2010–2024 ICST