DocumentCode :
3144812
Title :
The typed access matrix model
Author :
Sandhu, Ravi S.
Author_Institution :
Dept. of Inf. & Software Syst. Eng., George Mason Univ., Fairfax, VA, USA
fYear :
1992
fDate :
4-6 May 1992
Firstpage :
122
Lastpage :
136
Abstract :
The typed access matrix (TAM) model is defined by introducing the notion of strong typing into the Harrison, Ruzzo, and Ullman model (HRU) (M. H. Harrison et al., 1978). It is shown that monotonic TAM (MTAM) has decidable, but NP-hard, safety for its acyclic creation cases. It is further shown that ternary MTAM has polynomial time safety analysis for its acyclic cases, even though it is, in general, equivalent to MTAM. Ternary MTAM thus has strong safety properties. The expressive power of ternary MTAM has been shown to be equivalent to MTAM in general. The results establish that strong typing is crucial to achieving a useful demarcation between decidable and undecidable safety, and ternary monotonic commands are critical for tractable safety analysis
Keywords :
access control; security of data; NP-hard; acyclic creation cases; monotonic TAM; polynomial time safety analysis; strong typing; ternary MTAM; tractable safety analysis; typed access matrix model; Access control; Authorization; Information systems; Permission; Power engineering and energy; Power system modeling; Protection; Safety; Security; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2825-1
Type :
conf
DOI :
10.1109/RISP.1992.213266
Filename :
213266
Link To Document :
بازگشت