10
1 Access Control Matrix CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 9, 2004

Access Control Matrix

  • Upload
    chesna

  • View
    35

  • Download
    0

Embed Size (px)

DESCRIPTION

Access Control Matrix. CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 9, 2004. Acknowledgements. Many of these slides came from Matt Bishop, author of Computer Security: Art and Science. Chapter 2: Access Control Matrix. Overview Access Control Matrix Model - PowerPoint PPT Presentation

Citation preview

Page 1: Access Control Matrix

1

Access Control Matrix

CSSE 490 Computer Security

Mark Ardis, Rose-Hulman Institute

March 9, 2004

Page 2: Access Control Matrix

2

Acknowledgements

Many of these slides came from Matt Bishop, author of Computer Security: Art and Science

Page 3: Access Control Matrix

3

Chapter 2: Access Control Matrix

Overview Access Control Matrix Model Special Rights

• Principle of Attenuation of Privilege

Page 4: Access Control Matrix

4

Overview

Protection state of system• Describes current settings, values of system

relevant to protection

Access control matrix• Describes protection state precisely

• Matrix describing rights of subjects (processes and users)

• State transitions change elements of matrix

Page 5: Access Control Matrix

5

Description

objects (entities)

subj

ects

s1

s2

sn

o1 … om s1 … sn Subjects S = { s1,…,sn }

Objects O = { o1,…,om }

Rights R = { r1,…,rk }

Entries A[si, oj] R

A[si, oj] = { rx, …, ry } means subject si has rights rx, …, ry over object oj

Page 6: Access Control Matrix

6

Rights

Unix• r = read

• w = write

• x = execute

AFS• r = read

• l = list

• i = insert

• d = delete

• w = write

• k = lock

• a = administer

Page 7: Access Control Matrix

7

Example

Processes p, q Files f, g Rights r, w, x, a(ppend), o(wn)

f g p q

p rwo r rwxo w

q a ro rrwxo

Page 8: Access Control Matrix

8

Copy Right

Allows possessor to give rights to another

Often attached to a right, so only applies to that right• r is read right that cannot be copied

• rc is read right that can be copied

Is copy flag copied when giving r rights?• Depends on model, instantiation of model

Page 9: Access Control Matrix

9

Own Right

Usually allows possessor to change entries in ACM column• So owner of object can add, delete rights for

others

• May depend on what system allows• Can’t give rights to specific (set of) users

• Can’t pass copy flag to specific (set of) users

Page 10: Access Control Matrix

10

Attenuation of Privilege

Principle says you can’t give rights you do not possess• Restricts addition of rights within a system

• Usually ignored for owner• Why?