© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2005 Ravi Sandhu 2 Reference Jason Crampton. On permissions, inheritance and role hierarchies. Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: Several diagrams and text excerpts are taken directly from this paper.
© 2005 Ravi Sandhu 3 Arrow notation
© 2005 Ravi Sandhu 4 Administrative scope
© 2005 Ravi Sandhu 5 Effective roles of permission p up down neutral
© 2005 Ravi Sandhu 6 Permission Hierarchy
© 2005 Ravi Sandhu 7 Consistency and redundancy
© 2005 Ravi Sandhu 8 Simulating BLP (liberal *-property)
© 2005 Ravi Sandhu 9 Simulating BLP (liberal *-property) Maximal or minimal permission is assigned to exactly one role
© 2005 Ravi Sandhu 10 Constraints for simulating BLP
© 2005 Ravi Sandhu 11 Constraints for simulating BLP
© 2005 Ravi Sandhu 12 Constraints for simulating BLP
© 2005 Ravi Sandhu 13 Constraints for simulating BLP
© 2005 Ravi Sandhu 14 Constraints for simulating BLP
© 2005 Ravi Sandhu 15 Security levels
© 2005 Ravi Sandhu 16 Security levels