January 12, 2024 Outline
Reading: text, 3.3–3.4
Due: Homework #1, due January 19; Project selection, due January 26
Module 7 (Reading: text: §3.3)
- Take-Grant Protection Model
- Counterpoint to HRU result
- Symmetry of take and grant rights
- Islands (maximal subject-only tg-connected subgraphs)
- Bridges (as a combination of terminal and initial spans)
Module 8 (Reading: text: §3.3.1–3.3.2)
- Sharing
- Definition: can•share(α, x, y, G0)
true iff there exists a sequence of protection graphs G0 …, Gn such that
G0 ⊢* Gn using only take, grant, create, remove rules and in Gn,
there is an edge from x to y labeled α
- Theorem: can•share(r, x, y, G0) iff
there is an edge from x to y labeled r in G0, or
all of the following hold:
- there is a vertex y′ with an edge from y′ to y
labeled r;
- there is a subject y′′ which terminally spans to y′, or
y′′ = y′;
- there is a subject x′ which initially spans to x, or
x′ = x; and
- there is a sequence of islands I1, …, In connected by bridges for which
x′ ∈ I1 and y′′ ∈ In.
- Model Interpretation
- ACM very general, broadly applicable; Take-Grant more specific, can model fewer
situations
- Example: shared buffer managed by trusted third party
Module 9 (Reading: text: §3.3.3–3.3.5)
- can•steal(r x, y, G0) definition and theorem
- Definition: can•steal( α, x, y, G0)
true iff there is no edge labeled α from x to y in G0 and
there exists a sequence of protection graphs G0, …, Gn and
there exists a sequence of protection graphs such that the
following hold simultaneously:
- there is an edge from x to y labeled α in Gn;
- there is a sequence of rule applications ρ1, … ρn; and
- for all vertices v and w in Gi−1, 1 ≤ i <n, if there is an
edge from v to y in G0 labeled α, then ρi is
not of the form “v grants (α to y) to w”.
- Theorem: can•steal(α, x, y, G0) iff
all of the following hold:
- there is no edge from x to y labeled α in Gn;
- there is an edge from x to y labeled α in Gn;
- there is a subject vertex x′ such that x′ = x or
x′ initially spans to x; and
- there is a vertex s with an edge labeled α to y in G0
and for which can•steal(t, x, s, G0) holds.
- Conspiracy
- What is of interest?
- Access, deletion sets
- Conspiracy graph
- Number of conspirators
Module 10 (Reading: text, §3.4)
- Schematic Protection Model (SPM)
- Protection type, ticket, function, link predicate, filter function
- Take-Grant as an instance of SPM