Reading: text, §2, 16.1–16.3 Due: Homework 1, on Apr. 5
Greetings and felicitations!
Access Control Matrix
Subjects, objects, and rights
Primitive commands
Commands and conditions: create-file, various flavors of grant-right to show conditions and nested commands
Decidability of security
Notion of leakage in terms of ACM
Determining security of a generic system with generic rights and mono-operational commands is decidable
Determining security of a generic system with generic rights is undecidable (HRU result)
Meaning: can’t derive a generic algorithm; must look at (sets of) individual case
Access Control Lists
UNIX method
Full ACLs: describe, revocation issue
Capabilities
Capability-based addressing
Inheritance of C-Lists
Lock and Key
Associate with each object a lock; associate with each process that has access to object a key (it’s a cross between ACLs and C-Lists)
Example: cryptographic (Gifford). X object enciphered with key K. Associate an opener R with X. Then: OR-Access: K can be recovered with any Di in a list of n deciphering transformations, so R = (E1(K), E2(K), …, En(K)) and any process with access to any of the D_i’s can access the file AND-Access: need all n deciphering functions to get K: R = E1(E2(… En(K) …))