Expressive power of the single-object typed access matrix model
نویسندگان
چکیده
The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple implementation of SOTAM in a distributed environment using the familiar client-server architecture. In particular the stipulation that each command modi es a single column of the access matrix, is re ected in the desirable property that each command modi es a single access control list corresponding to that column. In this paper we show that TAM and SOTAM are formally equivalent in their expressive power. This result establishes that SOTAM has precisely the same expressive power as TAM, while having a simple implementation at the same time. In a nutshell, this result tells us that manipulation of access control information can be achieved in its most general form by manipulation of a single access control list (ACL) at a time. The work of both authors is partially supported by National Science Foundation grant CCR9202270. Ravi Sandhu is also supported by the National Security Agency through contract MDA90492-C-5141. We are grateful to Dan Atkinson, Nathaniel Macon, Howard Stainer, and Mike Ware for their support and encouragement in making this work possible.
منابع مشابه
Expressive Power of the Single - ObjectTyped Access Matrix
The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple impleme...
متن کاملImplementation Considerations for the Typed Access Matrix Model in a Distributed Environment
The typed access matrix (TAM) model was recently de ned by Sandhu. TAM combines the strong safety properties for propagation of access rights obtained in Sandhu's Schematic Protection Model, with the natural expressive power of Harrison, Ruzzo, and Ullman's model. In this paper we consider the implementation of TAM in a distributed environment. To this end we propose a simpli ed version of TAM ...
متن کاملThe typed access matrix model
The access matrix model as formalized by Harrison, Ruzzo, and Ullman (HRU) has broad expressive power. Unfortunately, HRU has weak safety properties (i.e., the determination of whether or not a given subject can ever acquire access to a given object). Most security policies of practical interest fall into the undecidable cases of HRU. This is true even for monotonic policies (i.e., where access...
متن کاملA theory for comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. While such comparisons are generally based on simulations between different access control schemes, the definitions for simulations that are used in the literature are informal, and make it impossible to put results and claims about the expressive power of access control models i...
متن کاملFormal Model and Analysis of Usage Control
FORMAL MODEL AND ANALYSIS OF USAGE CONTROL Xinwen Zhang, Ph.D. George Mason University, 2006 Dissertation Director: Ravi S. Sandhu Dissertation Co-director: Francesco Parisi-Presicce The concept of usage control (UCON) was introduced as a unified approach to capturing a number of extensions for access control models and systems. In UCON, a control decision is determined by three aspects: author...
متن کامل