© 2005 ravi sandhu permissions and inheritance (best viewed in slide show mode) ravi sandhu...

Post on 26-Mar-2015

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2005 Ravi Sandhuwww.list.gmu.edu

Permissions and Inheritance(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason Universitywww.list.gmu.edusandhu@gmu.edu

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Reference

• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92

• Several diagrams and text excerpts are taken directly from this paper.

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Arrow notation

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative scope

5

© 2005 Ravi Sandhuwww.list.gmu.edu

Effective roles of permission p

up

down

neutral

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Permission Hierarchy

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Consistency and redundancy

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Maximal or minimal permission is assigned to exactly one role

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

12

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

13

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

14

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

15

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

16

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

top related