The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

27
© 2004 Ravi Sandhu www.list.gmu.edu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

description

The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM). Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]. TAM: Typed Access Matrix Model TAM adds types to HRU and preserves strong safety results of SPM/ESPM - PowerPoint PPT Presentation

Transcript of The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

Page 1: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

© 2004 Ravi Sandhuwww.list.gmu.edu

The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

2

© 2004 Ravi Sandhuwww.list.gmu.edu

Outline

• TAM: Typed Access Matrix Model• TAM adds types to HRU and preserves strong safety

results of SPM/ESPM• SO-TAM: Single Object TAM

• SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM

• ATAM: Augmented TAM• ATAM adds testing for absence of rights to TAM• ATAM is equivalent to TAM in one sense but more

expressive in another

Page 3: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

3

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 4: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

4

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 5: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

5

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM commands

Page 6: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

6

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM primitive operations

Page 7: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

7

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: enter and delete

Page 8: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

8

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 9: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

9

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 10: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

10

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 11: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

11

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 12: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

12

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 13: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

13

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 14: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

14

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM: Monotonic TAM

Page 15: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

15

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 16: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

16

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 17: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

17

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON as a MTAM Canonical Scheme

Page 18: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

18

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM schemes

Page 19: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

19

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM unfolded state

Page 20: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

20

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM unfolded state

Page 21: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

21

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM safety

Page 22: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

22

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 23: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

23

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 24: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

24

© 2004 Ravi Sandhuwww.list.gmu.edu

Binary and Unary MTAM

• Unary MTAM• Useless

• Binary MTAM• Single-parent creation or spontaneous double-

child creation• Less expressive than multi-parent creation

Page 25: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

25

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM: single object TAM

Page 26: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

26

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM

• SOTAM is equivalent in expressive power to TAM

Page 27: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

27

© 2004 Ravi Sandhuwww.list.gmu.edu

ATAM: Augmented TAM

• Allow testing for absence of rights in the conditions of commands

• ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation• “Most likely not” has recently been shown to be

“provably cannot”