January 10, 2024 Outline
Reading: text, §2.3–2.4, 3.1–3.3; [1,2]
Due: Homework #1, due January 19; Project selection, due January 26
Module 4 (Reading: text: §2.3–2.4)
- Primitive operations
- enter r into A[s, o]
- delete r from A[s, o]
- create subject s (note that ∀ x [ A[s′, x] = A[x, s′] = ∅ ])
- create object o (note that ∀ x [ A[s, o′] = ∅ ])
- destroy subject s
- destroy object o
- Commands and examples
- Regular command: create•file
- Mono-operational command: make•owner
- Conditional command: grant•rights
- Biconditional command: grant•read•if•r•and•c
- Doing “or” of 2 conditions: grant•read•if•r•or•c
- General form
- Miscellaneous points
- Copy flag and right
- Own as a distinguished right
- Principle of attenuation of privilege
Module 5 (Reading: [1])
- Attribute-Based Access Control Matrix
- Attributes
- Predicates
- Modified primitive operations
- Commands
Module 6 (Reading: text: §3.1–3.2; [2])
- What is the safety question?
- An unauthorized state is one in which a generic right r could be leaked into an entry in the ACM that did not previously contain r. An initial state is safe for r if it cannot lead to a state in which r could be leaked.
- Question: in a given arbitrary protection system, is safety decidable?
- Mono-operational case: there is an algorithm that decides whether a given mono-operational system and initial state is safe for a given generic right.
- General case: It is undecidable whether a given state of a given protection system is safe for a given generic right.
- Approach: represent Turing machine tape as access control matrix, transitions as commands
- Reduce halting problem to it
- Related results
- The set of unsafe systems is recursively enumerable
- Monotonicity: no delete or destroy primitive operations
- The safety question for biconditional monotonic protection systems is undecidable.
- The safety question for monoconditional monotonic protection systems is decidable.
- The safety question for monoconditional protection systems without the destroy primitive operation is decidable.
Module 7 (Reading: text: §3.3)
- Take-Grant Protection Model
- Counterpoint to HRU result
- Symmetry of take and grant rights
- Islands (maximal subject-only tg-connected subgraphs)
- Bridges (as a combination of terminal and initial spans)
References
- X. Zhang, Y. Li, and D. Nalla, “An Attribute-Based Access Control Matrix Model,”
Proceedings of the 2005 ACM Symposium on Applied Computing pp. 359–363 (Mar. 2005);
doi: 10.1145/1066677.1066760.
- M. Tripunitara and N. Li, “The Foundational Work of Harrison-Ruzzo-Ullman Revisited,”
IEEE Transactions on Dependable and Secure Computing 10(1) pp. 280–309 (Jan. 2013);
doi: 10.1109/TDSC.2012.77.