![Page 1: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/1.jpg)
© 2004 Ravi Sandhuwww.list.gmu.edu
The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)
Ravi SandhuLaboratory for Information Security Technology
George Mason [email protected]
![Page 2: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/2.jpg)
2
© 2004 Ravi Sandhuwww.list.gmu.edu
Outline
• TAM: Typed Access Matrix Model• TAM adds types to HRU and preserves strong safety
results of SPM/ESPM• SO-TAM: Single Object TAM
• SO-TAM manipulates one column of the access matrix at a time and is equivalent to TAM
• ATAM: Augmented TAM• ATAM adds testing for absence of rights to TAM• ATAM is equivalent to TAM in one sense but more
expressive in another
![Page 3: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/3.jpg)
3
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM adds types to HRU
![Page 4: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/4.jpg)
4
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM adds types to HRU
![Page 5: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/5.jpg)
5
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM commands
![Page 6: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/6.jpg)
6
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM primitive operations
![Page 7: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/7.jpg)
7
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM operations: enter and delete
![Page 8: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/8.jpg)
8
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM operations: create and destroy
![Page 9: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/9.jpg)
9
© 2004 Ravi Sandhuwww.list.gmu.edu
TAM operations: create and destroy
![Page 10: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/10.jpg)
10
© 2004 Ravi Sandhuwww.list.gmu.edu
ORCON in TAM
![Page 11: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/11.jpg)
11
© 2004 Ravi Sandhuwww.list.gmu.edu
ORCON in TAM
![Page 12: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/12.jpg)
12
© 2004 Ravi Sandhuwww.list.gmu.edu
ORCON in TAM
![Page 13: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/13.jpg)
13
© 2004 Ravi Sandhuwww.list.gmu.edu
ORCON in TAM
![Page 14: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/14.jpg)
14
© 2004 Ravi Sandhuwww.list.gmu.edu
MTAM: Monotonic TAM
![Page 15: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/15.jpg)
15
© 2004 Ravi Sandhuwww.list.gmu.edu
MTAM Canonical Schemes
![Page 16: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/16.jpg)
16
© 2004 Ravi Sandhuwww.list.gmu.edu
MTAM Canonical Schemes
![Page 17: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/17.jpg)
17
© 2004 Ravi Sandhuwww.list.gmu.edu
ORCON as a MTAM Canonical Scheme
![Page 18: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/18.jpg)
18
© 2004 Ravi Sandhuwww.list.gmu.edu
Acyclic TAM schemes
![Page 19: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/19.jpg)
19
© 2004 Ravi Sandhuwww.list.gmu.edu
Acyclic TAM unfolded state
![Page 20: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/20.jpg)
20
© 2004 Ravi Sandhuwww.list.gmu.edu
Acyclic MTAM unfolded state
![Page 21: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/21.jpg)
21
© 2004 Ravi Sandhuwww.list.gmu.edu
Acyclic MTAM safety
![Page 22: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/22.jpg)
22
© 2004 Ravi Sandhuwww.list.gmu.edu
Ternary MTAM
![Page 23: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/23.jpg)
23
© 2004 Ravi Sandhuwww.list.gmu.edu
Ternary MTAM
![Page 24: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/24.jpg)
24
© 2004 Ravi Sandhuwww.list.gmu.edu
Binary and Unary MTAM
• Unary MTAM• Useless
• Binary MTAM• Single-parent creation or spontaneous double-
child creation• Less expressive than multi-parent creation
![Page 25: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/25.jpg)
25
© 2004 Ravi Sandhuwww.list.gmu.edu
SOTAM: single object TAM
![Page 26: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/26.jpg)
26
© 2004 Ravi Sandhuwww.list.gmu.edu
SOTAM
• SOTAM is equivalent in expressive power to TAM
![Page 27: The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM)](https://reader035.vdocument.in/reader035/viewer/2022062301/56814fcd550346895dbd907e/html5/thumbnails/27.jpg)
27
© 2004 Ravi Sandhuwww.list.gmu.edu
ATAM: Augmented TAM
• Allow testing for absence of rights in the conditions of commands
• ATAM is equivalent in expressive power to TAM in unbounded simulation but most likely not in bounded simulation• “Most likely not” has recently been shown to be
“provably cannot”