The typed access matrix model
- 2 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 122-136
- https://doi.org/10.1109/risp.1992.213266
Abstract
The typed access matrix (TAM) model is defined by introducing the notion of strong typing into the Harrison, Ruzzo, and Ullman model (HRU) (M. H. Harrison et al., 1978). It is shown that monotonic TAM (MTAM) has decidable, but NP-hard, safety for its acyclic creation cases. It is further shown that ternary MTAM has polynomial time safety analysis for its acyclic cases, even though it is, in general, equivalent to MTAM. Ternary MTAM thus has strong safety properties. The expressive power of ternary MTAM has been shown to be equivalent to MTAM in general. The results establish that strong typing is crucial to achieving a useful demarcation between decidable and undecidable safety, and ternary monotonic commands are critical for tractable safety analysis.Keywords
This publication has 17 references indexed in Scilit:
- Safety analysis for the extended schematic protection modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Beyond the pale of MAC and DAC-defining new forms of access controlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A comment on the ‘basic security theorem’ of Bell and LaPadulaInformation Processing Letters, 1985
- Safety in grammatical protection systemsInternational Journal of Parallel Programming, 1983
- Unidirectional Transport of Rights and Take–Grant ControlIEEE Transactions on Software Engineering, 1982
- The transfer of information and authority in a protection systemPublished by Association for Computing Machinery (ACM) ,1979
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- Protection in operating systemsCommunications of the ACM, 1976
- A lattice model of secure information flowCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974