Access Control Matrix - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Access Control Matrix

Description:

Access Control Matrix. CSSE 490 Computer Security. Mark Ardis, Rose ... Access control matrix. Describes protection ... to change entries in ACM column ... – PowerPoint PPT presentation

Number of Views:88
Avg rating:3.0/5.0
Slides: 11
Provided by: matt298
Category:
Tags: access | an | control | entries | entry | matrix

less

Transcript and Presenter's Notes

Title: Access Control Matrix


1
Access Control Matrix
  • CSSE 490 Computer Security
  • Mark Ardis, Rose-Hulman Institute
  • March 9, 2004

2
Acknowledgements
  • Many of these slides came from Matt Bishop,
    author of Computer Security Art and Science

3
Chapter 2 Access Control Matrix
  • Overview
  • Access Control Matrix Model
  • Special Rights
  • Principle of Attenuation of Privilege

4
Overview
  • Protection state of system
  • Describes current settings, values of system
    relevant to protection
  • Access control matrix
  • Describes protection state precisely
  • Matrix describing rights of subjects (processes
    and users)
  • State transitions change elements of matrix

5
Description
  • Subjects S s1,,sn
  • Objects O o1,,om
  • Rights R r1,,rk
  • Entries Asi, oj ? R
  • Asi, oj rx, , ry means subject si has
    rights rx, , ry over object oj

6
Rights
  • Unix
  • r read
  • w write
  • x execute
  • AFS
  • r read
  • l list
  • i insert
  • d delete
  • w write
  • k lock
  • a administer

7
Example
  • Processes p, q
  • Files f, g
  • Rights r, w, x, a(ppend), o(wn)
  • f g p q
  • p rwo r rwxo w
  • q a ro r rwxo

8
Copy Right
  • Allows possessor to give rights to another
  • Often attached to a right, so only applies to
    that right
  • r is read right that cannot be copied
  • rc is read right that can be copied
  • Is copy flag copied when giving r rights?
  • Depends on model, instantiation of model

9
Own Right
  • Usually allows possessor to change entries in ACM
    column
  • So owner of object can add, delete rights for
    others
  • May depend on what system allows
  • Cant give rights to specific (set of) users
  • Cant pass copy flag to specific (set of) users

10
Attenuation of Privilege
  • Principle says you cant give rights you do not
    possess
  • Restricts addition of rights within a system
  • Usually ignored for owner
  • Why?
Write a Comment
User Comments (0)
About PowerShow.com