Analysis of access in the Take-Grant model

نویسنده

  • Denis Brechka
چکیده

The article discribe methods of verifing the conditions of access in computer systems based on Take-Grant protection model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)

Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...

متن کامل

The Practical Application of a Decidable Access Model

While the safety of a number of access models has been formally established, few of these models are reflected in real systems. Most currently deployed commodity systems are based on access models that have been formally proven either unsafe or undecidable. Models that are decidable and safe, such as take-grant, fail to model issues that are needed to account for safety and security in capabili...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Analysis of spatial distribution and access to schools in district 20th of Tehran ‎municipality

In urban planning, proper distribution of facilities and educational services is important, because only if there is an equity in the distribution of services and land uses, it will be possible for all residents to take advantage from them. The purpose of this paper is to investigate the spatial distribution of schools and ‎the accessibility of households to public education schools in 20th dis...

متن کامل

Conspiracy and Information Flow in the Take-Grant Protection Model

The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout the modelled system. This paper analyzes the problem of sharing information in the context of paths along which information can flow, and presents the number of actors necessary and sufficient to share information, in this model. The results are applied to information f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1208.0108  شماره 

صفحات  -

تاریخ انتشار 2012