16
© 2005 Ravi Sandhu www.list.gmu.edu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

Embed Size (px)

Citation preview

Page 1: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

© 2005 Ravi Sandhuwww.list.gmu.edu

Permissions and Inheritance(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Reference

• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92

• Several diagrams and text excerpts are taken directly from this paper.

Page 3: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Arrow notation

Page 4: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative scope

Page 5: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

5

© 2005 Ravi Sandhuwww.list.gmu.edu

Effective roles of permission p

up

down

neutral

Page 6: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Permission Hierarchy

Page 7: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Consistency and redundancy

Page 8: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Page 9: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Maximal or minimal permission is assigned to exactly one role

Page 10: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 11: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 12: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

12

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 13: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

13

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 14: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

14

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

Page 15: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

15

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

Page 16: © 2005 Ravi Sandhu  Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

16

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels