© 2004 ravi sandhu the typed access matrix model (tam) and augmented tam (atam) ravi sandhu...

27
© 2004 Ravi Sandhu www.list.gmu.edu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

Upload: isabel-pruitt

Post on 26-Mar-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

© 2004 Ravi Sandhuwww.list.gmu.edu

The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

2

© 2004 Ravi Sandhuwww.list.gmu.edu

Outline

• TAM: Typed Access Matrix Model• TAM adds types to HRU and preserves strong safety

results of SPM/ESPM• SO-TAM: Single Object TAM

• SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM

• ATAM: Augmented TAM• ATAM adds testing for absence of rights to TAM• ATAM is equivalent to TAM in one sense but more

expressive in another

Page 3: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

3

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 4: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

4

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 5: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

5

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM commands

Page 6: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

6

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM primitive operations

Page 7: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

7

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: enter and delete

Page 8: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

8

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 9: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

9

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 10: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

10

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 11: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

11

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 12: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

12

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 13: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

13

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 14: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

14

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM: Monotonic TAM

Page 15: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

15

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 16: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

16

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 17: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

17

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON as a MTAM Canonical Scheme

Page 18: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

18

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM schemes

Page 19: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

19

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM unfolded state

Page 20: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

20

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM unfolded state

Page 21: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

21

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM safety

Page 22: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

22

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 23: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

23

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 24: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

24

© 2004 Ravi Sandhuwww.list.gmu.edu

Binary and Unary MTAM

• Unary MTAM• Useless

• Binary MTAM• Single-parent creation or spontaneous double-

child creation• Less expressive than multi-parent creation

Page 25: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

25

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM: single object TAM

Page 26: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

26

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM

• SOTAM is equivalent in expressive power to TAM

Page 27: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

27

© 2004 Ravi Sandhuwww.list.gmu.edu

ATAM: Augmented TAM

• Allow testing for absence of rights in the conditions of commands

• ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation• “Most likely not” has recently been shown to be

“provably cannot”