Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

A Privilege Separation Method for Security Commercial Transactions

Download
430 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_17,
        author={Yasha Chen and Jun Hu and Xinmao Gai and Yu Sun},
        title={A Privilege Separation Method for Security Commercial Transactions},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={privilege separation fraud management security commercial transactions formal method},
        doi={10.1007/978-3-642-23602-0_17}
    }
    
  • Yasha Chen
    Jun Hu
    Xinmao Gai
    Yu Sun
    Year: 2012
    A Privilege Separation Method for Security Commercial Transactions
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_17
Yasha Chen,*, Jun Hu1, Xinmao Gai2, Yu Sun1
  • 1: Beijing University of Technology
  • 2: National University of Defense Technology
*Contact email: cys925@hotmail.com

Abstract

Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.