Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2004 Ravi Sandhu www.list.gmu.edu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology.

Similar presentations


Presentation on theme: "© 2004 Ravi Sandhu www.list.gmu.edu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology."— Presentation transcript:

1 © 2004 Ravi Sandhu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology George Mason University

2 © 2004 Ravi Sandhu 2 Outline TAM: Typed Access Matrix Model TAM adds types to HRU and preserves strong safety results of SPM/ESPM SO-TAM: Single Object TAM SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM ATAM: Augmented TAM ATAM adds testing for absence of rights to TAM ATAM is equivalent to TAM in one sense but more expressive in another

3 © 2004 Ravi Sandhu 3 TAM adds types to HRU

4 © 2004 Ravi Sandhu 4 TAM adds types to HRU

5 © 2004 Ravi Sandhu 5 TAM commands

6 © 2004 Ravi Sandhu 6 TAM primitive operations

7 © 2004 Ravi Sandhu 7 TAM operations: enter and delete

8 © 2004 Ravi Sandhu 8 TAM operations: create and destroy

9 © 2004 Ravi Sandhu 9 TAM operations: create and destroy

10 © 2004 Ravi Sandhu 10 ORCON in TAM

11 © 2004 Ravi Sandhu 11 ORCON in TAM

12 © 2004 Ravi Sandhu 12 ORCON in TAM

13 © 2004 Ravi Sandhu 13 ORCON in TAM

14 © 2004 Ravi Sandhu 14 MTAM: Monotonic TAM

15 © 2004 Ravi Sandhu 15 MTAM Canonical Schemes

16 © 2004 Ravi Sandhu 16 MTAM Canonical Schemes

17 © 2004 Ravi Sandhu 17 ORCON as a MTAM Canonical Scheme

18 © 2004 Ravi Sandhu 18 Acyclic TAM schemes

19 © 2004 Ravi Sandhu 19 Acyclic TAM unfolded state

20 © 2004 Ravi Sandhu 20 Acyclic MTAM unfolded state

21 © 2004 Ravi Sandhu 21 Acyclic MTAM safety

22 © 2004 Ravi Sandhu 22 Ternary MTAM

23 © 2004 Ravi Sandhu 23 Ternary MTAM

24 © 2004 Ravi Sandhu 24 Binary and Unary MTAM Unary MTAM Useless Binary MTAM Single-parent creation or spontaneous double- child creation Less expressive than multi-parent creation

25 © 2004 Ravi Sandhu 25 SOTAM: single object TAM

26 © 2004 Ravi Sandhu 26 SOTAM SOTAM is equivalent in expressive power to TAM

27 © 2004 Ravi Sandhu 27 ATAM: Augmented TAM Allow testing for absence of rights in the conditions of commands ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation Most likely not has recently been shown to be provably cannot


Download ppt "© 2004 Ravi Sandhu www.list.gmu.edu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology."

Similar presentations


Ads by Google