We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byIsabel Pruitt
Modified over 3 years ago
© 2004 Ravi Sandhu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2004 Ravi Sandhu 2 Outline TAM: Typed Access Matrix Model TAM adds types to HRU and preserves strong safety results of SPM/ESPM SO-TAM: Single Object TAM SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM ATAM: Augmented TAM ATAM adds testing for absence of rights to TAM ATAM is equivalent to TAM in one sense but more expressive in another
© 2004 Ravi Sandhu 3 TAM adds types to HRU
© 2004 Ravi Sandhu 4 TAM adds types to HRU
© 2004 Ravi Sandhu 5 TAM commands
© 2004 Ravi Sandhu 6 TAM primitive operations
© 2004 Ravi Sandhu 7 TAM operations: enter and delete
© 2004 Ravi Sandhu 8 TAM operations: create and destroy
© 2004 Ravi Sandhu 9 TAM operations: create and destroy
© 2004 Ravi Sandhu 10 ORCON in TAM
© 2004 Ravi Sandhu 11 ORCON in TAM
© 2004 Ravi Sandhu 12 ORCON in TAM
© 2004 Ravi Sandhu 13 ORCON in TAM
© 2004 Ravi Sandhu 14 MTAM: Monotonic TAM
© 2004 Ravi Sandhu 15 MTAM Canonical Schemes
© 2004 Ravi Sandhu 16 MTAM Canonical Schemes
© 2004 Ravi Sandhu 17 ORCON as a MTAM Canonical Scheme
© 2004 Ravi Sandhu 18 Acyclic TAM schemes
© 2004 Ravi Sandhu 19 Acyclic TAM unfolded state
© 2004 Ravi Sandhu 20 Acyclic MTAM unfolded state
© 2004 Ravi Sandhu 21 Acyclic MTAM safety
© 2004 Ravi Sandhu 22 Ternary MTAM
© 2004 Ravi Sandhu 23 Ternary MTAM
© 2004 Ravi Sandhu 24 Binary and Unary MTAM Unary MTAM Useless Binary MTAM Single-parent creation or spontaneous double- child creation Less expressive than multi-parent creation
© 2004 Ravi Sandhu 25 SOTAM: single object TAM
© 2004 Ravi Sandhu 26 SOTAM SOTAM is equivalent in expressive power to TAM
© 2004 Ravi Sandhu 27 ATAM: Augmented TAM Allow testing for absence of rights in the conditions of commands ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation Most likely not has recently been shown to be provably cannot
© Ravi Sandhu HRU and TAM Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2004 Ravi Sandhu The Schematic Protection Model (SPM) Ravi Sandhu Laboratory for Information Security Technology George Mason University.
© 2004 Ravi Sandhu The Safety Problem in Access Control HRU Model Ravi Sandhu Laboratory for Information Security Technology George Mason.
© 2004 Ravi Sandhu The Extended Schematic Protection Model (ESPM) Ravi Sandhu Laboratory for Information Security Technology George Mason.
© 2004 Ravi Sandhu A Perspective on Graphs and Access Control Models Ravi Sandhu Laboratory for Information Security Technology George.
© 2004 Ravi Sandhu Safety in Access Control Take-Grant (best viewed in slide-show mode) Ravi Sandhu Laboratory for Information Security.
25 seconds left….. 24 seconds left….. 23 seconds left…..
Jeopardy Topic 1Topic Q 1Q 6Q 11Q 16Q 21 Q 2Q 7Q 12Q 17Q 22 Q 3Q 8Q 13Q 18Q 23 Q 4Q 9Q 14Q 19Q 24 Q 5Q 10Q 15Q 20Q 25 Final Jeopardy.
© 2005 Ravi Sandhu Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
© 2005 Ravi Sandhu Access Control Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
ABC Technology Project Mrs. Kiddle. ABCs of Technology Word 1 Word 2 Word 3 Word 4 Word 5 Word 6 Word 7 Word 8 Word 9 Word 19 Word 20 Word 21 Word 22.
My Alphabet Book 2 a b c d e f g h i j k l m n o p q r s t u v w x y z My name is Autumn and I work hard at school.
We will resume in: 25 Minutes We will resume in: 24 Minutes.
Chapter 5 Test Review Sections 5-1 through 5-4. Simplify each expression. 1)2) 3)4) 5) 6)
“Start-to-End” Simulations Imaging of Single Molecules at the European XFEL Igor Zagorodnov S2E Meeting DESY 10. February 2014.
© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
1 Chapter 1 The Study of Body Function Image PowerPoint Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Addition 1’s to
Slide 1 Advanced Piloting Cruise Plot. Advanced Piloting Cruise United States Power Squadrons ® Part I Question 1 Question 2 Question 3 Question 4 Question.
Information Assurance: A Personal Perspective Ravi Sandhu
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Department of Computer Science Data Structures Using C++ 2E Chapter 3 Pointers and Array-Based Lists C++ has three types of data Simple Structured.
Ravi Sandhu Venkata Bhamidipati Laboratory for Information Security Technology (LIST) George Mason University Role-Based Administration of User-Role Assignment:
ARBAC99 (Model for Administration of Roles) Ravi Sandhu Qamar Munawer George Mason University Laboratory for Information Security Technology
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
© 2012 National Heart Foundation of Australia. Slide 2.
© 2017 SlidePlayer.com Inc. All rights reserved.