YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Permissions and Inheritance (best viewed in slide show mode)

© 2005 Ravi Sandhuwww.list.gmu.edu

Permissions and Inheritance(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: Permissions and Inheritance (best viewed in slide show mode)

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Reference

• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92

• Several diagrams and text excerpts are taken directly from this paper.

Page 3: Permissions and Inheritance (best viewed in slide show mode)

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Arrow notation

Page 4: Permissions and Inheritance (best viewed in slide show mode)

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative scope

Page 5: Permissions and Inheritance (best viewed in slide show mode)

5

© 2005 Ravi Sandhuwww.list.gmu.edu

Effective roles of permission p

up

down

neutral

Page 6: Permissions and Inheritance (best viewed in slide show mode)

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Permission Hierarchy

Page 7: Permissions and Inheritance (best viewed in slide show mode)

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Consistency and redundancy

Page 8: Permissions and Inheritance (best viewed in slide show mode)

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Page 9: Permissions and Inheritance (best viewed in slide show mode)

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Maximal or minimal permission is assigned to exactly one role

Page 10: Permissions and Inheritance (best viewed in slide show mode)

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 11: Permissions and Inheritance (best viewed in slide show mode)

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 12: Permissions and Inheritance (best viewed in slide show mode)

12

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 13: Permissions and Inheritance (best viewed in slide show mode)

13

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 14: Permissions and Inheritance (best viewed in slide show mode)

14

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 15: Permissions and Inheritance (best viewed in slide show mode)

15

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

Page 16: Permissions and Inheritance (best viewed in slide show mode)

16

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels


Related Documents