CHAPTER 9
MATHEMATICAL MODELS OF COMPUTER SECURITY
Matt Bishop
9.2.1 Access-Control Matrix Model
9.2.2 Harrison, Ruzzo, and Ullman and Other Results
9.2.3 Typed Access Control Model
9.3.1 Mandatory and Discretionary Access-Control Models
9.3.2 Originator-Controlled Access-Control Model and DRM
9.3.3 Role-Based Access Control Models and Groups
9.4.2 Biba's Strict Integrity Policy Model
9.1 WHY MODELS ARE IMPORTANT.
When you drive a new car, you look for specific items that will help you control the car: the accelerator, the brake, the shift, and the steering wheel. These exist on all cars and perform the function of speeding the car up, slowing it down, and turning it left and right. This forms a model of the car. With these items properly working, you can make a convincing argument that the model correctly describes what a car must have in order to move and be steered properly.
A model in computer security serves the same purpose. It presents a general description of a computer system (or collection of systems). The model provides a definition of “protect” (e.g., “keep confidential” or “prevent unauthorized change to”) and conditions under which the protection is provided. With mathematical models, the conditions can be ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.