Download presentation
Presentation is loading. Please wait.
Published byJack McFadden Modified over 10 years ago
1
© 2005 Ravi Sandhu www.list.gmu.edu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu sandhu@gmu.edu
2
© 2005 Ravi Sandhu www.list.gmu.edu 2 Reference Jason Crampton. On permissions, inheritance and role hierarchies. Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92 Several diagrams and text excerpts are taken directly from this paper.
3
© 2005 Ravi Sandhu www.list.gmu.edu 3 Arrow notation
4
© 2005 Ravi Sandhu www.list.gmu.edu 4 Administrative scope
5
© 2005 Ravi Sandhu www.list.gmu.edu 5 Effective roles of permission p up down neutral
6
© 2005 Ravi Sandhu www.list.gmu.edu 6 Permission Hierarchy
7
© 2005 Ravi Sandhu www.list.gmu.edu 7 Consistency and redundancy
8
© 2005 Ravi Sandhu www.list.gmu.edu 8 Simulating BLP (liberal *-property)
9
© 2005 Ravi Sandhu www.list.gmu.edu 9 Simulating BLP (liberal *-property) Maximal or minimal permission is assigned to exactly one role
10
© 2005 Ravi Sandhu www.list.gmu.edu 10 Constraints for simulating BLP
11
© 2005 Ravi Sandhu www.list.gmu.edu 11 Constraints for simulating BLP
12
© 2005 Ravi Sandhu www.list.gmu.edu 12 Constraints for simulating BLP
13
© 2005 Ravi Sandhu www.list.gmu.edu 13 Constraints for simulating BLP
14
© 2005 Ravi Sandhu www.list.gmu.edu 14 Constraints for simulating BLP
15
© 2005 Ravi Sandhu www.list.gmu.edu 15 Security levels
16
© 2005 Ravi Sandhu www.list.gmu.edu 16 Security levels
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.