{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Lecture3.2 - IS 2150 TEL 2810 Introduction to Security...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor SIS Associate Professor, SIS Lecture 3.2 September 13, 2011 Access Control Model Foundational Results 1
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Protection System State of a system Current values of memory locations registers secondary storage etc memory locations, registers, secondary storage, etc. other system components Protection state (P) A system state that is considered secure A protection system Captures the conditions for s tate transition Consists of two parts: A set of generic rights A set of commands 2
Image of page 2
Protection System Subject ( S : set of all subjects) Eg.: users, processes, agents, etc. Object ( O : set of all objects) Eg.:Processes, files, devices Ri ht ( R t f ll i ht ) Right ( : set of all rights) An action/operation that a subject is allowed/disallowed on objects Access Matrix A : a [ s , o ] R Set of Protection States: ( S , O , A ) 3 Initial state X 0 = ( S 0 , O 0 , A 0 )
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
State Transitions i +1 X i X i +1 X i i +1 X i +1 : upon transition i +1 , the system moves from state X i to X i +1 X * Y : the system moves from * X : the system moves from state X to Y after a set of transitions X Y c i +1 ( p i +1 , 1 , p i +1 , 2 , …, p i +1 , m ) X i c i +1 ( p i +1
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern