Transcript
Page 1: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

© 2004 Ravi Sandhuwww.list.gmu.edu

The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

2

© 2004 Ravi Sandhuwww.list.gmu.edu

Outline

• TAM: Typed Access Matrix Model• TAM adds types to HRU and preserves strong safety

results of SPM/ESPM• SO-TAM: Single Object TAM

• SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM

• ATAM: Augmented TAM• ATAM adds testing for absence of rights to TAM• ATAM is equivalent to TAM in one sense but more

expressive in another

Page 3: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

3

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 4: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

4

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM adds types to HRU

Page 5: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

5

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM commands

Page 6: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

6

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM primitive operations

Page 7: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

7

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: enter and delete

Page 8: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

8

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 9: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

9

© 2004 Ravi Sandhuwww.list.gmu.edu

TAM operations: create and destroy

Page 10: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

10

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 11: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

11

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 12: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

12

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 13: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

13

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON in TAM

Page 14: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

14

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM: Monotonic TAM

Page 15: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

15

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 16: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

16

© 2004 Ravi Sandhuwww.list.gmu.edu

MTAM Canonical Schemes

Page 17: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

17

© 2004 Ravi Sandhuwww.list.gmu.edu

ORCON as a MTAM Canonical Scheme

Page 18: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

18

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM schemes

Page 19: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

19

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic TAM unfolded state

Page 20: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

20

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM unfolded state

Page 21: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

21

© 2004 Ravi Sandhuwww.list.gmu.edu

Acyclic MTAM safety

Page 22: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

22

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 23: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

23

© 2004 Ravi Sandhuwww.list.gmu.edu

Ternary MTAM

Page 24: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

24

© 2004 Ravi Sandhuwww.list.gmu.edu

Binary and Unary MTAM

• Unary MTAM• Useless

• Binary MTAM• Single-parent creation or spontaneous double-

child creation• Less expressive than multi-parent creation

Page 25: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

25

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM: single object TAM

Page 26: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

26

© 2004 Ravi Sandhuwww.list.gmu.edu

SOTAM

• SOTAM is equivalent in expressive power to TAM

Page 27: © 2004 Ravi Sandhu  The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology

27

© 2004 Ravi Sandhuwww.list.gmu.edu

ATAM: Augmented TAM

• Allow testing for absence of rights in the conditions of commands

• ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation• “Most likely not” has recently been shown to be

“provably cannot”


Top Related