This preview shows pages 1–5. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: 1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 3.2 September 13, 2011 Access Control Model Foundational Results 2 Protection System State of a system Current values of memory locations, registers, secondary storage, etc. other system components Protection state (P) A system state that is considered secure A protection system Captures the conditions for s tate transition Consists of two parts: A set of generic rights A set of commands 3 Protection System Subject ( S : set of all subjects) Eg.: users, processes, agents, etc. Object ( O : set of all objects) Eg.:Processes, files, devices Right ( R : set of all rights) An action/operation that a subject is allowed/disallowed on objects Access Matrix A : a [ s , o ] R Set of Protection States: ( S , O , A ) Initial state X = ( S , O , A ) 4 State Transitions X i X i X i +1 X i +1 i +1 X i i +1 X i +1 : upon transition i +1 , the system moves from state X i to X i +1 X * Y : the system moves from state X to Y after a set of transitions X X Y Y * X i X i X i +1 X i +1 c i +1 ( p i +1 , 1 , p i +1 , 2 , , p i +1 , m ) X i c i +1 ( p i +1 , 1 , p i +1 , 2 , , p i +1 ,...
View
Full
Document
This note was uploaded on 12/01/2011 for the course INFSCI 2501 taught by Professor Jjoshi during the Spring '11 term at Pittsburgh.
 Spring '11
 jjoshi

Click to edit the document details