160 likes | 286 Views
Permissions and Inheritance (best viewed in slide show mode). Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu sandhu@gmu.edu. Reference.
E N D
Permissions and Inheritance(best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu sandhu@gmu.edu
Reference • Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92 • Several diagrams and text excerpts are taken directly from this paper.
Effective roles of permission p up down neutral
Simulating BLP (liberal *-property) Maximal or minimal permission is assigned to exactly one role