Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment
نویسندگان
چکیده
The typed access matrix (TAM) model was recently de ned by Sandhu. TAM combines the strong safety properties for propagation of access rights obtained in Sandhu's Schematic Protection Model, with the natural expressive power of Harrison, Ruzzo, and Ullman's model. In this paper we consider the implementation of TAM in a distributed environment. To this end we propose a simpli ed version of TAM called Single-Object TAM (SO-TAM). We illustrate the practical expressive power of SO-TAM by showing how the ORCON policy for originator control of documents can be speci ed in SO-TAM. We provide arguments to support our conjecture that SO-TAM is theoretically as expressive as TAM. We show that SO-TAM has a simple implementation in a typical client-server architecture. Our design is based on access control lists as the principal means for enforcing access to subjects and objects. In addition, certi cate servers are introduced for generating certi cates for checking access rights in those cases where access control lists are insu cient. A major advantage of our design is that atomicity of operations does not require a distributed commit.
منابع مشابه
Expressive Power of the Single - ObjectTyped Access Matrix
The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple impleme...
متن کاملExpressive power of the single-object typed access matrix model
The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple impleme...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملEffective Design of a 3×4 Two Dimensional Distributed Amplifier Based on Gate Line Considerations
In this paper two dimensional wave propagation is used for power combining in drain nodes of a distributed amplifier (DA). The proposed two dimensional DA uses an electrical funnel to add the currents of drain nodes. The proposed structure is modified due to gate lines considerations. Total gain improvement is achieved by engineering the characteristic impedance of gate lines and also make appr...
متن کاملA Preventive Maintenance Decision Policy Based on Economic-Technical and Applicibility Considerations
The present study is intended to develop a Preventive Maintenance (PM) policy for industrial applications, while considering two different objectives: the first objective is to optimize the total maintenance costs, i.e., the Preventive Maintenance (PM) and Emergency Maintenance (EM) Costs Per Unit Time. (CPUT). The second objective is to design the policy in such a way that the simplicity of it...
متن کامل