16
© 2005 Ravi Sandhu www.list.gmu.edu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

Permissions and Inheritance (best viewed in slide show mode)

Embed Size (px)

DESCRIPTION

Permissions and Inheritance (best viewed in slide show mode). Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]. Reference. - PowerPoint PPT Presentation

Citation preview

© 2005 Ravi Sandhuwww.list.gmu.edu

Permissions and Inheritance(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Reference

• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92

• Several diagrams and text excerpts are taken directly from this paper.

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Arrow notation

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative scope

5

© 2005 Ravi Sandhuwww.list.gmu.edu

Effective roles of permission p

up

down

neutral

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Permission Hierarchy

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Consistency and redundancy

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Maximal or minimal permission is assigned to exactly one role

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

12

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

13

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

14

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

15

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

16

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels