Theft and Conspiracy in the Take-Grant Protection Model
نویسنده
چکیده
Models of protection in computer systems usually possess two components: a finite, labeled, directed two color graph representing the protection state of an operating system and a finite set of graph transformation rules with which the protection state may be changed. Harrison et al. demonstrated [ 1 ] that the safety problem for a very general protection model is undecidable; i.e., no algorithm could decide, given a protection graph and a set of transformation rules, whether an edge with a particular label is ever added to the graph. The Take-Grant Model [2-4] has been developed in response to this negative result in order to study such questions for a particular set of transition rules. Linear-time algorithms to test safety-like problems have been found [2,3] for the Take-Grant transition rules. Although the model is simple enough to permit linear-time decision procedures, it is rich enough to implement many sharing relationships [4]. Here we concentrate on the formal development supporting the motivational and interpretive treatments given in [4,5]. First, we characterize the class of graphs that can be created with the Take-Grant rules. Next, the can . steal predicate, first introduced in a limited form (41, is developed in full generality making it applicable to the common situation of “stealing tiles.” Another main topic is that of quantifying the amount of “cooperation” required to share or steal rights. By the amount of “cooperation” we mean the number of users (i.e., subject vertices in the model) required to initiate rules in order for a particular edge to be added to a graph. This concept has been called “conspiracy” in [2]. Exact conspiracy measurements for arbitrary protection graphs are derived and an algorithm for discovering minimum conspiracy is presented.
منابع مشابه
Conspiracy and Information Flow in the Take-Grant Protection Model
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout the modelled system. This paper analyzes the problem of sharing information in the context of paths along which information can flow, and presents the number of actors necessary and sufficient to share information, in this model. The results are applied to information f...
متن کاملTheft of Information in the Take-Grant Protection Model
Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is an excellent theoretical tool for examining such issues because conditions necessary and sufficien...
متن کاملAnalysis of access in the Take-Grant model
The article discribe methods of verifing the conditions of access in computer systems based on Take-Grant protection model.
متن کاملAlgorithm for searching bridges of specified types in the protection graph for Take-Grant protection model
The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The proposed algorithm is based on a classical breadth-first search algorithm.
متن کاملجرم تبانی علیه اموال، اعراض و نفوس مردم
Criminal conspiracy has been criminalized in different legal systems. Conspiracy is an Accessory Offence. Accessory Offences like Carrying of forbidden weapons or tramping are behaviors that don’t contain immediate and direct harm. But they show the dangerous mood in the preprators and increase the probability of committing serious crimes in the future. These reasons justify the criminaliza...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 23 شماره
صفحات -
تاریخ انتشار 1981