© 2005 ravi sandhu permissions and inheritance (best viewed in slide show mode) ravi sandhu...
Post on 26-Mar-2015
216 Views
Preview:
TRANSCRIPT
© 2005 Ravi Sandhuwww.list.gmu.edu
Permissions and Inheritance(best viewed in slide show mode)
Ravi SandhuLaboratory for Information Security Technology
George Mason Universitywww.list.gmu.edusandhu@gmu.edu
2
© 2005 Ravi Sandhuwww.list.gmu.edu
Reference
• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92
• Several diagrams and text excerpts are taken directly from this paper.
3
© 2005 Ravi Sandhuwww.list.gmu.edu
Arrow notation
4
© 2005 Ravi Sandhuwww.list.gmu.edu
Administrative scope
5
© 2005 Ravi Sandhuwww.list.gmu.edu
Effective roles of permission p
up
down
neutral
6
© 2005 Ravi Sandhuwww.list.gmu.edu
Permission Hierarchy
7
© 2005 Ravi Sandhuwww.list.gmu.edu
Consistency and redundancy
8
© 2005 Ravi Sandhuwww.list.gmu.edu
Simulating BLP (liberal *-property)
9
© 2005 Ravi Sandhuwww.list.gmu.edu
Simulating BLP (liberal *-property)
Maximal or minimal permission is assigned to exactly one role
10
© 2005 Ravi Sandhuwww.list.gmu.edu
Constraints for simulating BLP
11
© 2005 Ravi Sandhuwww.list.gmu.edu
Constraints for simulating BLP
12
© 2005 Ravi Sandhuwww.list.gmu.edu
Constraints for simulating BLP
13
© 2005 Ravi Sandhuwww.list.gmu.edu
Constraints for simulating BLP
14
© 2005 Ravi Sandhuwww.list.gmu.edu
Constraints for simulating BLP
15
© 2005 Ravi Sandhuwww.list.gmu.edu
Security levels
16
© 2005 Ravi Sandhuwww.list.gmu.edu
Security levels
top related