To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Take-grant protection model

From Wikipedia, the free encyclopedia

The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer system that follows specific rules. It shows that even though the question of safety is in general undecidable, for specific systems it is decidable in linear time.

The model represents a system as directed graph, where vertices are either subjects or objects. The edges between them are labeled, and the label indicates the rights that the source of the edge has over the destination. Two rights occur in every instance of the model: take and grant. They play a special role in the graph rewriting rules describing admissible changes of the graph.

There are a total of four such rules:

  • take rule allows a subject to take rights of another object (add an edge originating at the subject)
  • grant rule allows a subject to grant own rights to another object (add an edge terminating at the subject)
  • create rule allows a subject to create new objects (add a vertex and an edge from the subject to the new vertex)
  • remove rule allows a subject to remove rights it has over on another object (remove an edge originating at the subject)

Preconditions for :

  • subject s has the right Take for o.
  • object o has the right r on p.

Preconditions for :

  • subject s has the right Grant for o.
  • s has the right r on p.

Using the rules of the take-grant protection model, one can reproduce in which states a system can change, with respect to the distribution of rights. Therefore, one can show if rights can leak with respect to a given safety model.

YouTube Encyclopedic

  • 1/3
    Views:
    9 417
    17 677
    5 697
  • Access Controls Part 1: Computer Security Lectures 2014/15 S2
  • Access Matrix to Implement Protection Model in Operating System
  • Access Control Matrix

Transcription

References

  • Lipton, Richard J.; Snyder, Lawrence (1977). "A Linear Time Algorithm for Deciding Subject Security" (PDF). Journal of the ACM. 24 (3): 455–464. CiteSeerX 10.1.1.149.4807. doi:10.1145/322017.322025.
  • Bishop, Matt (2004). Computer security: art and science. Addison-Wesley.

External links

This page was last edited on 21 August 2023, at 10:56
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.