update
authorchunhan
Fri, 12 Apr 2013 18:07:03 +0100
changeset 3 4d25a9919688
parent 2 301f567e2a8e
child 4 8b6ba7168f2d
child 6 4294abb1f38c
update
Paper.thy
--- a/Paper.thy	Fri Apr 12 10:46:43 2013 +0100
+++ b/Paper.thy	Fri Apr 12 18:07:03 2013 +0100
@@ -1326,20 +1326,6 @@
   Mercurial repository at \url{http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/rc/}.\\[-12mm]
 
 
-%  0. Not Policy-Analysis: cause even policy is analysed correct, there is still a gap between it and policy application to the real Access Control system. Hence here Our dynamic model is bridging this gap.  Policy-Analysis "basic" based on "Information flow", but it is not enough: the static "write" right to a certain typed file do not mean a process having this right definitely can write the file, it has to pass a "particular" "Control Flow" to achieve the state of "There are this typed file and this righted process"! 
-%  1. Both Dynamic and Statical analysis, and proved link between two \\
-%  2. Tainting Relation Formalisation  \\
-%  3. Formalisation and Verification than Model Checking  \\
-%  4. Universal Checker of Policy  \\
-%  5. source of RC rules made more precise \\
-%  6. RC example of Webserver with CGIs (key notion: Program Based Roles)  \\
-%  7. RBAC is more Policy-lever(with HUGE companies, many stablised num of roles but frequently varifying num of users); RC is more Program Base Roles, set for system with a lot of program based default value, once pre-setted, it will remains after running. which is key to policy checker.
-
-%The distinct feature of RC is to deal with program based roles, such as server behaviour. 
-%This is in contrast to usual RSBAC models where roles are modeled around a hierachy, for
-%example in a company. 
-
-
 %In a word, what the manager need is that given the
 %initial state of the system, a policy checker that make sure the under the policy
 %he made, this important file cannot: 1. be deleted; 2. be tainted. 
@@ -1361,24 +1347,10 @@
 %trace of system running. 
 % 2. decidable, that means this policy-checker should always terminate.
 
-
-%   The purpose of an operating system is to provide a common
-%  interface for accessing resources. This interface is typically 
-%  realised as a collection of system calls, for example for reading 
-%  and writing files, forking of processes, or sending and receiving 
-%  messages. Role based access control is one approach for 
-%  restricting access to such system calls: if a user has
-%  suffient rights, then a system call can be performed. 
+*}
 
-%  a user might have
-%  one or more roles and acces is granted if the role has sufficent
-%  rights
 
-%  static world...make predictions about accessing
-%  files, do they translate into actual systems behaviour.
 
-  
-*}
 
 
 (*<*)