Conspiracy and Information Flow in the Take-Grant Protection Model
Citation
- M. Bishop,
“Conspiracy and Information Flow in the Take-Grant Protection Model,”
Journal of Computer Security 4(4)
pp. 331–359 (1996).
Paper
Bibliographic Information
Abstract
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout the modelled system. This paper analyzes the problem of sharing information in the context of paths along which information can flow, and presents the number of actors necessary and sufficient to share information, in this model. The results are applied to information flow in a network to reduce the size of the set of actors who could have participated in the theft.
Notice
This is the manuscript version.
The definitive version was published in
Journal of Computer Security
1997, and is available at
https://content.iospress.com/articles/journal-of-computer-security/jcs4-4-04.