Simulation of the Augmented Typed Access Matrix Model (ATAM) using Roles
نویسندگان
چکیده
Role-based Access Control (RBAC) is a promising alternative to traditional discretionary (DAC) and mandatory access (MAC) controls. In RBAC permissions are associated with roles, and users are made members of the roles thereby acquiring the roles’ permissions. RBAC is policy neutral and flexible enough to accommodate diverse security policies. Access matrix models define another mechanism for enforcing the security policy. The Augmented Typed Access Matrix model (ATAM), an extension of Typed Access Matrix (TAM) model, defined by Sandhu is well known from this class of models. ATAM is defined by introducing strong typing (i.e., each subject or object created is to be of particular type which thereafter does not change). The ATAM is recognized as the current state of the art with respect to formal models for generalized access control policies. In this paper we formally show that ATAM can be simulated by appropriate configuration of RBAC components. Our results attest to the flexibility of RBAC and its ability to accommodate a wide range of decentralized administrative models.
منابع مشابه
On Testing for Absence of Rights in Access Control
The well-known access control model formalized by Harrison, Ruzzo, and Ullman (HRU) does not allow testing for absence of access rights in its commands. Sandhu's Typed Access Matrix (TAM) model, which introduces strong typing into the HRU model, continues this tradition. Ammann and Sandhu have recently proposed an extension of TAM called augmented TAM (ATAM), which allows testing for absence of...
متن کاملOn Testing for Absence of Rights in Access Control Models
The well-known access control model formalized by Harrison, Ruzzo, and Ullman (HRU) does not allow testing for absence of access rights in its commands. Sandhu's Typed Access Matrix (TAM) model, which introduces strong typing into the HRU model, continues this tradition. Ammann and Sandhu have recently proposed an extension of TAM called augmented TAM (ATAM), which allows testing for absence of...
متن کاملA theory for comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. While such comparisons are generally based on simulations between different access control schemes, the definitions for simulations that are used in the literature are informal, and make it impossible to put results and claims about the expressive power of access control models i...
متن کاملStructural Damage Assessment Via Model Updating Using Augmented Grey Wolf Optimization Algorithm (AGWO)
Some civil engineering-based infrastructures are planned for the Structural Health Monitoring (SHM) system based on their importance. Identifiction and detecting damage automatically at the right time are one of the major objectives this system faces. One of the methods to meet this objective is model updating whit use of optimization algorithms in structures.This paper is aimed to evaluate the...
متن کاملDevelopment of simulation model for performance evaluation of feed water system in a typical thermal power plant
The present paper deals with development of a simulation model for the performance evaluation of feed water system of a thermal power plant using Markov Birth-Death process and probabilistic approach. In present paper, the feed water system consists of four subsystems. After drawing transition diagram for feed water system, differential equations are developed and then solved recursively using ...
متن کامل