Applying the Take-Grant Protection Model

The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems. The models are extended to include theft of rights and sharing of information, and additional security policies are examined. The analysis suggests that in some cases the basic rules of the Take-Grant Protection Model should be augmented to represent the policy properly; when appropriate, such modifications are made and their effects with respect to the policy and its Take-Grant representations are discussed

[1]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[2]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[3]  Ken Thompson,et al.  The UNIX time-sharing system , 1974, CACM.

[4]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[5]  A. Retrospective,et al.  The UNIX Time-sharing System , 1977 .

[6]  Richard J. Lipton,et al.  A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.

[7]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[8]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[9]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .

[10]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[11]  David Jefferson,et al.  Protection in the Hydra Operating System , 1975, SOSP.

[12]  Lawrence Snyder,et al.  Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.

[13]  Lawrence Snyder On the synthesis and analysis of protection systems , 1977, SOSP '77.

[14]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[15]  Margaret S. Wu,et al.  Hierarchical Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.

[16]  Lawrence Snyder Theft and Conspiracy in the Take-Grant Protection Model , 1981, J. Comput. Syst. Sci..

[17]  Matt Bishop Hierarchical Take-Grant Protection systems , 1981, SOSP.