SlideShare a Scribd company logo
Theft and Conspiracy in the Take-Grant Protection
Model
Lawrence Snyder
Department of Computer Sciences
Purdue University
West Lafayette. IN 47907
Presented by: Raj Kumar Ranabhat
M.E in Computer Engineering(I/I)
Kathmandu University
2/14/2017 1
Take-Grant Protection Model
• A specific (not generic) system
• Set of rules for state transitions
• Safety decidable, and in time linear with the size of the system
• Goal: find conditions under which rights can be transferred from one
entity to another in the system
2/14/2017 2
System
objects (passive entities like files, . . . )
2/14/2017 3
o
subjects (active entities like users, processes . . . )
• don’t care (either a subject or an object)⊗
set of rights
apply a sequence of rewriting rules (witness) to G to get G’
R = {t , g , . . .}
apply rewriting rule x (witness) to G to get G′G ⊢x G′
G ⊢* G′
Take-Grant Protection Model
Let x,y and z be distinct vertices in a protection graph G
such that x is a subject. Let there be an edge from x to y
labeled ϒ such that "t" ϵ ϒ, an edge from y to z labeled β
and α ⊆ β. Then the take rule defines a new graph G' by
adding an edge to the protection graph from x to z labeled
α. Graphically,
2/14/2017 4
Take:
The rule can be read: "x takes (α to z) from y."
Let x,y and z be distinct vertices in a protection graph G
such that x is a subject. Let there be an edge from x to y
labeled ϒ such that "g"ϵ ϒ, an edge from x to z labeled β,
and α ⊆ β. The grant rule defines a new graph G' by adding
an edge from y to z labeled α. Graphically,
2/14/2017 5
Grant:
The rule can be read: "x grants (α to z) to y."
Let x be any subject vertex in a protection graph G and let α
be a non empty subset of R. Create defines a new graph G‘
by adding a new vertex n to the graph and an edge from x to
n labeled α. Graphically,
2/14/2017 6
Create:
The rule can be read: "x creates (α to) new {subject/object}n."
Let x and y be any distinct vertices in a protection graph G
such that x is a subject. Let there be an edge from x to y
labeled β, and let a be any subset of rights. Then remove
defines a new graph G' by deleting the α labels from β. If β
becomes empty as a result, the edge itself is deleted.
Graphically
2/14/2017 7
Remove:
The rule can be read: "x removes (α to) y."
Take-Grant Definable Graphs
2/14/2017 8
Take-Grant Definable Graphs
2/14/2017 9
x creates (tg to) new v
Take-Grant Definable Graphs
2/14/2017 10
x creates (tg to) new v
x grants (g to v) to y
Take-Grant Definable Graphs
2/14/2017 11
x creates (tg to) new v
x grants (g to v) to y
y grants (β to z) to v
Take-Grant Definable Graphs
2/14/2017 12
x creates (tg to) new v
x grants (g to v) to y
y grants (β to z) to v
x takes (β to z) from v
Let 𝐺0 be a protection graph containing exactly one
subject vertex and no edges. Then 𝐺0 ⊢* 𝐺 if and only
if
2/14/2017 13
Theorem:
• 𝐺 is a finite, directed, loop-free, two color graph
• the edges are labeled from non empty subsets of R
• At least one subject in 𝐺 has no incoming edges.
Let v be the initial subject, and 𝐺0 ⊢*𝐺.
2/14/2017 14
⇐:
• 𝐺 is obviously finite
• 𝐺 is a directed graph
• 𝐺 is loop-free
• two colored with the indicated labelling
• After reviewing the rule definition, it gives:
• Limits of rules:
• since vertices cannot be destroyed, v persists in any
graph derived from 𝐺0
• edges cannot be directed to a vertex that has no in-
coming edges so none can be assigned to v
let G satisfy the requirements and be the final graph in the theorem
2/14/2017 15
⇐:
• Let G have vertices x1,x2 . . . , xn
• Identify v with some subject x1 with no incoming edges
Construct G′ as follows:
• Perform “v creates (α ∪ {g } to) new subject xi”
• For all (xi, xj) where xi has a right over xj, do“x1 grants (α
to xj) to xi”
• Let β be the rights xi has over xj in G ; then do“v removes
((α ∪ {g }) − β) to xi)”
Now G′ is the desired G
Predicates and earlier results
• tg-path: Vertices p and q of G are tg-connected if there is a path
p=xo,….xn=q and the label alpha on the edge between xi and xi+1
contains t or g
• island : An island of G is a maximal, tg-connected subject-only
subgraph of G.
• A path xo,x1,…xn is an initial span if it has an associated word in {𝑡∗ 𝑔 }
• it is a terminal span if n>0 and it has associated word in {𝑡∗}
• it is a bridge if
2/14/2017 16
1. n>1 and xo and xn are subjects
2. an associated word is in {𝑡∗, 𝑡∗, 𝑡∗ 𝑔 𝑡∗, 𝑡∗ 𝑔 𝑡∗ }
3. the xi are objects (0<i<n)
2/14/2017 17
• islands: {p, u}, {w}, {y, s′}
• bridges: u, v, w; w, x, y
• initial span: p (associated word ν )
• terminal span: s′s (associated word 𝑡 )
can·share (α, p, q, 𝐺0 ) holds if, and only if, there is a sequence
of protection graphs 𝐺0 , . . ., 𝐺 𝑛 such that 𝐺0 ⊢* 𝐺 and in
𝐺 𝑛 there is an edge from p to q labeled α
2/14/2017 18
can·share Predicate :
Theft
2/14/2017 19
for two distinct vertices p and q in a protection
graph 𝐺0 , and right α, define
can·steal Predicate :
can·steal (α, p, q, 𝐺0 ) <=> ~ 𝑝
α
𝐺0
𝑞 and there exist protection
graph 𝐺1,…,𝐺 𝑛 such that
𝐺0⊢ 𝜌1
𝐺1 ⊢ 𝜌2
… ⊢ 𝜌 𝑛
𝐺 𝑛 ,
𝑝
α
𝐺 𝑛
𝑞, and
If 𝑠
α
𝐺0
𝑞 then no 𝜌𝑗 has the form
“s grants (α to q) to 𝑥𝑖” for any 𝑥𝑖 ϵ 𝐺𝑗−1, 1 ≤ 𝑗 < 𝑛.
Example of Stealing
2/14/2017 20
can·steal (α, s, w, 𝐺0 )
Example of Stealing
2/14/2017 21
can·steal (α, s, w, 𝐺0 )
• u grants (t to v) to s
Example of Stealing
2/14/2017 22
can·steal (α, s, w, 𝐺0 )
• u grants (t to v) to s
• s takes (t to x) from v
Example of Stealing
2/14/2017 23
• u grants (t to v) to s
• s takes (t to x) from v
• s takes (t to u) from x
can·steal (α, s, w, 𝐺0 )
Example of Stealing
2/14/2017 24
• u grants (t to v) to s
• s takes (t to x) from v
• s takes (t to u) from x
• s takes (α to w) from u
can·steal (α, s, w, 𝐺0 )
can·steal (α, p, q, 𝐺0 ) holds if, and only if, the
following hold simultaneously:
2/14/2017 25
can·steal Theorem :
• there is no edge from x-to-y labeled α in 𝐺0
• there is a subject x′= x or x′ initially spans to x
• there is a vertex s with an edge to y labeled α in
𝐺0
• can·share (α, p, q, 𝐺0 ) holds
Assume all four conditions hold
2/14/2017 26
⇒:
• If x a subject:
• x gets t rights to s (last condition); then takes α to y from
s(third condition)
• If x an object:
• can·share (t, x′, s, 𝐺0 ) holds
• If x′ has no α edge to y in 𝐺0 x′ takes (α to y) from s and
grants it to x
• If x′ has an edge to y in 𝐺0 , x′ creates surrogate x′′, gives it
(t to s) and (g to x′′); then x′′ takes (α to y) and grants it to
x
Assume can·steal (α, x, y, 𝐺0 ) holds
2/14/2017 27
⇐:
• First two conditions are immediate from definition of
can·share, can·steal
• Third condition is immediate from theorem of conditions for
can·share
• Fourth condition: let ρ be a minimal length sequence of rule
applications deriving 𝐺 𝑛 from 𝐺0
• Let i be the smallest index such that 𝐺𝑖−1 ⊢ 𝜌𝑖 𝐺𝑖 that adds
α from some p to y in 𝐺𝑖
• What rule is ρ𝑖 ?
2/14/2017 28
• Not remove or create rule
• y exists already
• Not grant rule
• 𝐺𝑖 is the first graph in which an edge labeled α to y is added ,
so by definition of can·share, it cannot be a grant
• Therefore ρ𝑖 must be a take rule, so can·share (t, p, s, 𝐺0 )
holds
• By earlier theorem, there is a subject s′ such that s′= s or s′
terminally spans to s
• Also, sequence of islands 𝑙1,…,𝑙 𝑛 with x′∈ 𝑙1, s′∈ 𝑙 𝑛
• Now consider what s is ?
2/14/2017 29
• If s object, s′≠ s
• If s′, p in same island, take p = s′; the can·share (t, x, s, 𝐺0 )
holds
• If they are not, the sequence is minimal, contradicting
assumption
• So choose s′ in same island as p
2/14/2017 30
If s subject, p ∈ 𝑙 𝑛
• If p ∉ 𝐺0, there is a subject q such that can·share (t, q, s,
𝐺0) holds
• s ∈ 𝐺 𝑜and none of the rules add new lables to
incoming edges on existing vertices
• As s owns α rights to y in 𝐺0 , two cases arise:
• If s = q, replace “s grants (α to y) to q” with the
sequence:
p takes (α to y) from s
p takes (g to q) from s
p grants (α to y) to q
• If s = q, you only need the first
Conspiracy
2/14/2017 31
If s subject, p ∈ 𝑙 𝑛
Conspiracy in general graphs
2/14/2017 32
Given a protection graph G with subject vertices 𝑋1 ,….,𝑋 𝑛 , we
will define a new graph, the conspiracy graph, H, determined by
G. H has vertices 𝑌1 ,…., 𝑌𝑛 and each 𝑌𝑖 has associated with it
the access−set A(𝑋𝑖 ). There is an undirected edge between
𝑌𝑖 and 𝑌𝑗 provided δ(𝑋𝑖 , 𝑋𝑗) ≠ Ø where δ is called the deletion
operation
δ(x,x') =all elements in A(x) n A(x') except those z for which
either (a) the only reason for z ∈ A(x) is that x initially spans
to z and the only reason for z ∈ A(x') is that x‘ initially spans
to z or (b) the only reason z ∈ A(x) is x terminally spans to z
and the only reason z ∈ A(x') is x‘ terminally spans to z.
The graph thus constructed is the conspiracy graph for G.
2/14/2017 33
2/14/2017 34
• Lemma 7.1: Can·share(a,p,q,G) is true if and only if some
𝑌𝑢 ∈ 𝑌𝑝 is connected so some 𝑌𝑣 ∈ 𝑌𝑠
• Theorem 7.2: To produce a witness to can.share(α,p,q,G)
|s.p.| conspirators are sufficient.
• Theorem 7.3: To produce a witness to can.share(α,p,q,G)
|s.p.| conspirators are necessary.
Concluding Remarks
2/14/2017 35
• how sharing is accomplished in the Take-Grant Model
• there is the question of algorithmic complexity of
determining the minimum number of conspirators required
for a right to be shared
• determine for a given graph what set of conspirators.
must have participated in the sharing of a right after the fact

More Related Content

What's hot

Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Planning in AI(Partial order planning)
Planning in AI(Partial order planning)Planning in AI(Partial order planning)
Planning in AI(Partial order planning)
Vicky Tyagi
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Data mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, dataData mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, data
Salah Amean
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
 
KNN
KNN KNN
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Clustering paradigms and Partitioning Algorithms
Clustering paradigms and Partitioning AlgorithmsClustering paradigms and Partitioning Algorithms
Clustering paradigms and Partitioning Algorithms
Umang MIshra
 
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
Simplilearn
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Error Detection & Recovery
Error Detection & RecoveryError Detection & Recovery
Error Detection & Recovery
Akhil Kaushik
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
 
Decision trees in Machine Learning
Decision trees in Machine Learning Decision trees in Machine Learning
Decision trees in Machine Learning
Mohammad Junaid Khan
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Graph coloring using backtracking
Graph coloring using backtrackingGraph coloring using backtracking
Graph coloring using backtracking
shashidharPapishetty
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
DUET
 

What's hot (20)

Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Planning in AI(Partial order planning)
Planning in AI(Partial order planning)Planning in AI(Partial order planning)
Planning in AI(Partial order planning)
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Data mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, dataData mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, data
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
KNN
KNN KNN
KNN
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Clustering paradigms and Partitioning Algorithms
Clustering paradigms and Partitioning AlgorithmsClustering paradigms and Partitioning Algorithms
Clustering paradigms and Partitioning Algorithms
 
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
KNN Algorithm - How KNN Algorithm Works With Example | Data Science For Begin...
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Error Detection & Recovery
Error Detection & RecoveryError Detection & Recovery
Error Detection & Recovery
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Decision trees in Machine Learning
Decision trees in Machine Learning Decision trees in Machine Learning
Decision trees in Machine Learning
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Graph coloring using backtracking
Graph coloring using backtrackingGraph coloring using backtracking
Graph coloring using backtracking
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 

Similar to Take-Grant Protection Model

Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
ASPAK2014
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
MuradAmn
 
Introduction to Treewidth
Introduction to TreewidthIntroduction to Treewidth
Introduction to Treewidth
ASPAK2014
 
Class8 calculus ii
Class8 calculus iiClass8 calculus ii
Class8 calculus ii
JOSUE DEL AGUILA RIOS
 
Ji2416271633
Ji2416271633Ji2416271633
Ji2416271633
IJERA Editor
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
The Statistical and Applied Mathematical Sciences Institute
 
Planted Clique Research Paper
Planted Clique Research PaperPlanted Clique Research Paper
Planted Clique Research Paper
Jose Andres Valdes
 
Entity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance MinimizationEntity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance Minimization
Roi Blanco
 
Lesson plan 6 (23 11-2010)
Lesson plan 6 (23 11-2010)Lesson plan 6 (23 11-2010)
Lesson plan 6 (23 11-2010)
itachihei
 
(α ψ)- Construction with q- function for coupled fixed point
(α   ψ)-  Construction with q- function for coupled fixed point(α   ψ)-  Construction with q- function for coupled fixed point
(α ψ)- Construction with q- function for coupled fixed point
Alexander Decker
 
Lecture2 xing
Lecture2 xingLecture2 xing
Lecture2 xing
Tianlu Wang
 
module4_dynamic programming_2022.pdf
module4_dynamic programming_2022.pdfmodule4_dynamic programming_2022.pdf
module4_dynamic programming_2022.pdf
Shiwani Gupta
 
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in GraphsAlgorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
IJERA Editor
 
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in GraphsAlgorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
IJERA Editor
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
Alexander Decker
 
FiniteElementNotes
FiniteElementNotesFiniteElementNotes
FiniteElementNotes
Martin Jones
 
Differentiation.pptx
Differentiation.pptxDifferentiation.pptx
Differentiation.pptx
kaveeshasathsarani3
 
Bayesian hybrid variable selection under generalized linear models
Bayesian hybrid variable selection under generalized linear modelsBayesian hybrid variable selection under generalized linear models
Bayesian hybrid variable selection under generalized linear models
Caleb (Shiqiang) Jin
 
A common fixed point theorem for six mappings in g banach space with weak-com...
A common fixed point theorem for six mappings in g banach space with weak-com...A common fixed point theorem for six mappings in g banach space with weak-com...
A common fixed point theorem for six mappings in g banach space with weak-com...
Alexander Decker
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
Fransiskeran
 

Similar to Take-Grant Protection Model (20)

Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
 
Introduction to Treewidth
Introduction to TreewidthIntroduction to Treewidth
Introduction to Treewidth
 
Class8 calculus ii
Class8 calculus iiClass8 calculus ii
Class8 calculus ii
 
Ji2416271633
Ji2416271633Ji2416271633
Ji2416271633
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Planted Clique Research Paper
Planted Clique Research PaperPlanted Clique Research Paper
Planted Clique Research Paper
 
Entity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance MinimizationEntity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance Minimization
 
Lesson plan 6 (23 11-2010)
Lesson plan 6 (23 11-2010)Lesson plan 6 (23 11-2010)
Lesson plan 6 (23 11-2010)
 
(α ψ)- Construction with q- function for coupled fixed point
(α   ψ)-  Construction with q- function for coupled fixed point(α   ψ)-  Construction with q- function for coupled fixed point
(α ψ)- Construction with q- function for coupled fixed point
 
Lecture2 xing
Lecture2 xingLecture2 xing
Lecture2 xing
 
module4_dynamic programming_2022.pdf
module4_dynamic programming_2022.pdfmodule4_dynamic programming_2022.pdf
module4_dynamic programming_2022.pdf
 
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in GraphsAlgorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
 
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in GraphsAlgorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
Algorithmic Aspects of Vertex Geo-dominating Sets and Geonumber in Graphs
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
FiniteElementNotes
FiniteElementNotesFiniteElementNotes
FiniteElementNotes
 
Differentiation.pptx
Differentiation.pptxDifferentiation.pptx
Differentiation.pptx
 
Bayesian hybrid variable selection under generalized linear models
Bayesian hybrid variable selection under generalized linear modelsBayesian hybrid variable selection under generalized linear models
Bayesian hybrid variable selection under generalized linear models
 
A common fixed point theorem for six mappings in g banach space with weak-com...
A common fixed point theorem for six mappings in g banach space with weak-com...A common fixed point theorem for six mappings in g banach space with weak-com...
A common fixed point theorem for six mappings in g banach space with weak-com...
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 

More from Raj Kumar Ranabhat

Sales forcedemo
Sales forcedemoSales forcedemo
Sales forcedemo
Raj Kumar Ranabhat
 
Sales force
Sales forceSales force
Sales force
Raj Kumar Ranabhat
 
From data mining to knowledge discovery in
From data mining to knowledge discovery inFrom data mining to knowledge discovery in
From data mining to knowledge discovery in
Raj Kumar Ranabhat
 
Security
SecuritySecurity
Kruskal's algorithm
Kruskal's algorithmKruskal's algorithm
Kruskal's algorithm
Raj Kumar Ranabhat
 
The Adoption of Knowledge Management Systems in Small Firms
The Adoption of Knowledge Management Systems in Small Firms The Adoption of Knowledge Management Systems in Small Firms
The Adoption of Knowledge Management Systems in Small Firms
Raj Kumar Ranabhat
 
Visual notation
Visual notationVisual notation
Visual notation
Raj Kumar Ranabhat
 
Visual Notation
Visual NotationVisual Notation
Visual Notation
Raj Kumar Ranabhat
 

More from Raj Kumar Ranabhat (8)

Sales forcedemo
Sales forcedemoSales forcedemo
Sales forcedemo
 
Sales force
Sales forceSales force
Sales force
 
From data mining to knowledge discovery in
From data mining to knowledge discovery inFrom data mining to knowledge discovery in
From data mining to knowledge discovery in
 
Security
SecuritySecurity
Security
 
Kruskal's algorithm
Kruskal's algorithmKruskal's algorithm
Kruskal's algorithm
 
The Adoption of Knowledge Management Systems in Small Firms
The Adoption of Knowledge Management Systems in Small Firms The Adoption of Knowledge Management Systems in Small Firms
The Adoption of Knowledge Management Systems in Small Firms
 
Visual notation
Visual notationVisual notation
Visual notation
 
Visual Notation
Visual NotationVisual Notation
Visual Notation
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

Take-Grant Protection Model

  • 1. Theft and Conspiracy in the Take-Grant Protection Model Lawrence Snyder Department of Computer Sciences Purdue University West Lafayette. IN 47907 Presented by: Raj Kumar Ranabhat M.E in Computer Engineering(I/I) Kathmandu University 2/14/2017 1
  • 2. Take-Grant Protection Model • A specific (not generic) system • Set of rules for state transitions • Safety decidable, and in time linear with the size of the system • Goal: find conditions under which rights can be transferred from one entity to another in the system 2/14/2017 2
  • 3. System objects (passive entities like files, . . . ) 2/14/2017 3 o subjects (active entities like users, processes . . . ) • don’t care (either a subject or an object)⊗ set of rights apply a sequence of rewriting rules (witness) to G to get G’ R = {t , g , . . .} apply rewriting rule x (witness) to G to get G′G ⊢x G′ G ⊢* G′
  • 4. Take-Grant Protection Model Let x,y and z be distinct vertices in a protection graph G such that x is a subject. Let there be an edge from x to y labeled ϒ such that "t" ϵ ϒ, an edge from y to z labeled β and α ⊆ β. Then the take rule defines a new graph G' by adding an edge to the protection graph from x to z labeled α. Graphically, 2/14/2017 4 Take: The rule can be read: "x takes (α to z) from y."
  • 5. Let x,y and z be distinct vertices in a protection graph G such that x is a subject. Let there be an edge from x to y labeled ϒ such that "g"ϵ ϒ, an edge from x to z labeled β, and α ⊆ β. The grant rule defines a new graph G' by adding an edge from y to z labeled α. Graphically, 2/14/2017 5 Grant: The rule can be read: "x grants (α to z) to y."
  • 6. Let x be any subject vertex in a protection graph G and let α be a non empty subset of R. Create defines a new graph G‘ by adding a new vertex n to the graph and an edge from x to n labeled α. Graphically, 2/14/2017 6 Create: The rule can be read: "x creates (α to) new {subject/object}n."
  • 7. Let x and y be any distinct vertices in a protection graph G such that x is a subject. Let there be an edge from x to y labeled β, and let a be any subset of rights. Then remove defines a new graph G' by deleting the α labels from β. If β becomes empty as a result, the edge itself is deleted. Graphically 2/14/2017 7 Remove: The rule can be read: "x removes (α to) y."
  • 9. Take-Grant Definable Graphs 2/14/2017 9 x creates (tg to) new v
  • 10. Take-Grant Definable Graphs 2/14/2017 10 x creates (tg to) new v x grants (g to v) to y
  • 11. Take-Grant Definable Graphs 2/14/2017 11 x creates (tg to) new v x grants (g to v) to y y grants (β to z) to v
  • 12. Take-Grant Definable Graphs 2/14/2017 12 x creates (tg to) new v x grants (g to v) to y y grants (β to z) to v x takes (β to z) from v
  • 13. Let 𝐺0 be a protection graph containing exactly one subject vertex and no edges. Then 𝐺0 ⊢* 𝐺 if and only if 2/14/2017 13 Theorem: • 𝐺 is a finite, directed, loop-free, two color graph • the edges are labeled from non empty subsets of R • At least one subject in 𝐺 has no incoming edges.
  • 14. Let v be the initial subject, and 𝐺0 ⊢*𝐺. 2/14/2017 14 ⇐: • 𝐺 is obviously finite • 𝐺 is a directed graph • 𝐺 is loop-free • two colored with the indicated labelling • After reviewing the rule definition, it gives: • Limits of rules: • since vertices cannot be destroyed, v persists in any graph derived from 𝐺0 • edges cannot be directed to a vertex that has no in- coming edges so none can be assigned to v
  • 15. let G satisfy the requirements and be the final graph in the theorem 2/14/2017 15 ⇐: • Let G have vertices x1,x2 . . . , xn • Identify v with some subject x1 with no incoming edges Construct G′ as follows: • Perform “v creates (α ∪ {g } to) new subject xi” • For all (xi, xj) where xi has a right over xj, do“x1 grants (α to xj) to xi” • Let β be the rights xi has over xj in G ; then do“v removes ((α ∪ {g }) − β) to xi)” Now G′ is the desired G
  • 16. Predicates and earlier results • tg-path: Vertices p and q of G are tg-connected if there is a path p=xo,….xn=q and the label alpha on the edge between xi and xi+1 contains t or g • island : An island of G is a maximal, tg-connected subject-only subgraph of G. • A path xo,x1,…xn is an initial span if it has an associated word in {𝑡∗ 𝑔 } • it is a terminal span if n>0 and it has associated word in {𝑡∗} • it is a bridge if 2/14/2017 16 1. n>1 and xo and xn are subjects 2. an associated word is in {𝑡∗, 𝑡∗, 𝑡∗ 𝑔 𝑡∗, 𝑡∗ 𝑔 𝑡∗ } 3. the xi are objects (0<i<n)
  • 17. 2/14/2017 17 • islands: {p, u}, {w}, {y, s′} • bridges: u, v, w; w, x, y • initial span: p (associated word ν ) • terminal span: s′s (associated word 𝑡 )
  • 18. can·share (α, p, q, 𝐺0 ) holds if, and only if, there is a sequence of protection graphs 𝐺0 , . . ., 𝐺 𝑛 such that 𝐺0 ⊢* 𝐺 and in 𝐺 𝑛 there is an edge from p to q labeled α 2/14/2017 18 can·share Predicate :
  • 19. Theft 2/14/2017 19 for two distinct vertices p and q in a protection graph 𝐺0 , and right α, define can·steal Predicate : can·steal (α, p, q, 𝐺0 ) <=> ~ 𝑝 α 𝐺0 𝑞 and there exist protection graph 𝐺1,…,𝐺 𝑛 such that 𝐺0⊢ 𝜌1 𝐺1 ⊢ 𝜌2 … ⊢ 𝜌 𝑛 𝐺 𝑛 , 𝑝 α 𝐺 𝑛 𝑞, and If 𝑠 α 𝐺0 𝑞 then no 𝜌𝑗 has the form “s grants (α to q) to 𝑥𝑖” for any 𝑥𝑖 ϵ 𝐺𝑗−1, 1 ≤ 𝑗 < 𝑛.
  • 20. Example of Stealing 2/14/2017 20 can·steal (α, s, w, 𝐺0 )
  • 21. Example of Stealing 2/14/2017 21 can·steal (α, s, w, 𝐺0 ) • u grants (t to v) to s
  • 22. Example of Stealing 2/14/2017 22 can·steal (α, s, w, 𝐺0 ) • u grants (t to v) to s • s takes (t to x) from v
  • 23. Example of Stealing 2/14/2017 23 • u grants (t to v) to s • s takes (t to x) from v • s takes (t to u) from x can·steal (α, s, w, 𝐺0 )
  • 24. Example of Stealing 2/14/2017 24 • u grants (t to v) to s • s takes (t to x) from v • s takes (t to u) from x • s takes (α to w) from u can·steal (α, s, w, 𝐺0 )
  • 25. can·steal (α, p, q, 𝐺0 ) holds if, and only if, the following hold simultaneously: 2/14/2017 25 can·steal Theorem : • there is no edge from x-to-y labeled α in 𝐺0 • there is a subject x′= x or x′ initially spans to x • there is a vertex s with an edge to y labeled α in 𝐺0 • can·share (α, p, q, 𝐺0 ) holds
  • 26. Assume all four conditions hold 2/14/2017 26 ⇒: • If x a subject: • x gets t rights to s (last condition); then takes α to y from s(third condition) • If x an object: • can·share (t, x′, s, 𝐺0 ) holds • If x′ has no α edge to y in 𝐺0 x′ takes (α to y) from s and grants it to x • If x′ has an edge to y in 𝐺0 , x′ creates surrogate x′′, gives it (t to s) and (g to x′′); then x′′ takes (α to y) and grants it to x
  • 27. Assume can·steal (α, x, y, 𝐺0 ) holds 2/14/2017 27 ⇐: • First two conditions are immediate from definition of can·share, can·steal • Third condition is immediate from theorem of conditions for can·share • Fourth condition: let ρ be a minimal length sequence of rule applications deriving 𝐺 𝑛 from 𝐺0 • Let i be the smallest index such that 𝐺𝑖−1 ⊢ 𝜌𝑖 𝐺𝑖 that adds α from some p to y in 𝐺𝑖 • What rule is ρ𝑖 ?
  • 28. 2/14/2017 28 • Not remove or create rule • y exists already • Not grant rule • 𝐺𝑖 is the first graph in which an edge labeled α to y is added , so by definition of can·share, it cannot be a grant • Therefore ρ𝑖 must be a take rule, so can·share (t, p, s, 𝐺0 ) holds • By earlier theorem, there is a subject s′ such that s′= s or s′ terminally spans to s • Also, sequence of islands 𝑙1,…,𝑙 𝑛 with x′∈ 𝑙1, s′∈ 𝑙 𝑛 • Now consider what s is ?
  • 29. 2/14/2017 29 • If s object, s′≠ s • If s′, p in same island, take p = s′; the can·share (t, x, s, 𝐺0 ) holds • If they are not, the sequence is minimal, contradicting assumption • So choose s′ in same island as p
  • 30. 2/14/2017 30 If s subject, p ∈ 𝑙 𝑛 • If p ∉ 𝐺0, there is a subject q such that can·share (t, q, s, 𝐺0) holds • s ∈ 𝐺 𝑜and none of the rules add new lables to incoming edges on existing vertices • As s owns α rights to y in 𝐺0 , two cases arise: • If s = q, replace “s grants (α to y) to q” with the sequence: p takes (α to y) from s p takes (g to q) from s p grants (α to y) to q • If s = q, you only need the first
  • 31. Conspiracy 2/14/2017 31 If s subject, p ∈ 𝑙 𝑛
  • 32. Conspiracy in general graphs 2/14/2017 32 Given a protection graph G with subject vertices 𝑋1 ,….,𝑋 𝑛 , we will define a new graph, the conspiracy graph, H, determined by G. H has vertices 𝑌1 ,…., 𝑌𝑛 and each 𝑌𝑖 has associated with it the access−set A(𝑋𝑖 ). There is an undirected edge between 𝑌𝑖 and 𝑌𝑗 provided δ(𝑋𝑖 , 𝑋𝑗) ≠ Ø where δ is called the deletion operation δ(x,x') =all elements in A(x) n A(x') except those z for which either (a) the only reason for z ∈ A(x) is that x initially spans to z and the only reason for z ∈ A(x') is that x‘ initially spans to z or (b) the only reason z ∈ A(x) is x terminally spans to z and the only reason z ∈ A(x') is x‘ terminally spans to z. The graph thus constructed is the conspiracy graph for G.
  • 34. 2/14/2017 34 • Lemma 7.1: Can·share(a,p,q,G) is true if and only if some 𝑌𝑢 ∈ 𝑌𝑝 is connected so some 𝑌𝑣 ∈ 𝑌𝑠 • Theorem 7.2: To produce a witness to can.share(α,p,q,G) |s.p.| conspirators are sufficient. • Theorem 7.3: To produce a witness to can.share(α,p,q,G) |s.p.| conspirators are necessary.
  • 35. Concluding Remarks 2/14/2017 35 • how sharing is accomplished in the Take-Grant Model • there is the question of algorithmic complexity of determining the minimum number of conspirators required for a right to be shared • determine for a given graph what set of conspirators. must have participated in the sharing of a right after the fact