Chapter 14: System Protection
Chapter 14: System Protection
Protection
Goals of Protection
Principles of Protection
Domain of Protection
Access Matrix
Access Control
Capability-Based Systems
Language-Based Protection
Objectives
Introduction
For the year 1974, one source has identified 339 cases
of computer-related crime. lf The average loss in the
339 incidents was $544,000. This average is not
distorted by a few exceptional cases--the median loss
was very close to the average. Most of the incidents
involved simple fraud. by an employee who had access
to computerized financial records. In 85% of the cases,
management did not report the incident to the policeoften because publicity about it would have been
embarrassing.
Goals of Protection
Principles of Protection
Limits
Can
Or
Domain Structure
Access Matrix
Access Matrix
of Oi
op from Oi to Oj (denoted by *)
control
transfer
Implementation of Access
Matrix
with M Rk
Difficult to group objects (consider an object that all domains can read)
Resulting per-object list consists of ordered pairs < domain, rights-set >
defining all domains with non-empty set of access rights for the object
Easily extended to contain default set -> If M default set, also allow
access
Implementation of Access
Matrix (Cont.)
Option 4 Lock-key
Compromise between access lists and
capability lists
Each object has list of unique bit
patterns, called locks
Each domain as list of unique bit
patterns called keys
Process in a domain can only access
object if domain has key that matches
one of the locks
Comparison of
Implementations
Many
Language-Based Protection