April 5, 2017 Outline
Reading: Chapters from revised text, §2, 3.1–3.2; [TL13]
- Primitive operations
- enter r into A[s, o]
- delete r from A[s, o]
- create subject (note that ∀x [ A[s′, x] = A[x, s′] = ∅ ])
- create object o (note that ∀x [ A[x, o′] = ∅ ])
- destroy subject s
- destroy object o
- Commands and examples
- Regular command: create•file
- Mono-operational command: make•owner
- Conditional command: grant•rights
- Biconditional command: grant•read•if•r•and•c
- Doing “or” of 2 conditions: grant•read•if•r•or•c
- General form
- Miscellaneous points
- Copy flag and right
- Own as a distinguished right
- Principle of attenuation of privilege
- What is the safety question?
- An unauthorized state is one in which a generic right r could be leaked into an entry in the ACM that did not previously contain r. An initial state is safe for r if it cannot lead to a state in which r could be leaked.
- Question: in a given arbitrary protection system, is safety decidable?
- Mono-operational case: there is an algorithm that decides whether a given mono-operational system and initial state is safe for a given generic right.