Outline for January 11, 2012
Reading:
§2; [Z+05]
Access control matrix and entities
Subject, objects (includes subjects)
State is (
S
,
O
,
A
) where
A
is access control matrix
Rights (represent abstract notions)
Instantiating access control matrices
Example 1: UNIX file system
read, write, execute on files
read, write, execute on directories
Example 2: Boolean expression evaluation
Verbs and rules
Access Restriction Facility
Example 3: History and limiting rights
Static rights, current rights
Malicious library routine
Primitive operations
enter
r
into
A
[
s
,
o
]
delete
r
from
A
[
s
,
o
]
create subject
s
(note that ∀
x
[
A
[
s′
,
x
] =
A
[
x
,
s′
] = ∅ ])
create object
o
(note that ∀
x
[
A
[
x
,
o′
] = ∅ ])
destroy subject
s
destroy object
o
Commands and examples
Regular command: create•file
Mono-operational command: make•owner
Conditional command: grant•rights
Biconditional command: grant•read•if•r•and•c
Doing “or” of 2 conditions: grant•read•if•r•or•c
General form
Miscellaneous points
Copy flag and right
Own as a distinguished right
Principle of attenuation of privilege
A PDF version is available here.
ECS 235B, Foundations of Computer and Information Security
Winter Quarter 2012