Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Prove that the two properties of the hierarchy function ( see Section 5 . 2 . 3 ) allow only trees and single nodes as

Prove that the two properties of the hierarchy function (see Section 5.2.3) allow only trees and single nodes as organizations of objects.
Section 5.2.3 is as following:
Let S be the set of subjects of a system and let O be the set of objects. Let P be the set of rights r for read, a for write, w for read/write, and e for empty.3 Let M be a set of possible access control matrices for the system. Let C be the set of classifications (or clearances), let K be the set of categories, and let L = C \times K be the set of security levels. Finally, let F be the set of 3-tuples (fs, fo, fc), where fs and fc associate with each subject maximum and current security levels, respectively, and fo associates with each object a security level. The relation dom from Definition 51 is defined here in the obvious way.
3The right called empty here is called execute in Bell and LaPadula [150]. However, they define execute as neither observation nor alteration(and note that it differs from the notion of execute that most systems implement). For clarity, we changed the e rights name to the more descriptive empty.
The system objects may be organized as a set of hierarchies (trees and single nodes). Let H represent the set of hierarchy functions h : O -> P(O).4 These functions have two properties. Let oi, oj, ok in O. Then:
4P(O) is the power set of Othat is, the set of all possible subsets of O.
If oi != oj, then h(oi)\cap h(oj)=.
There is no set {o1, o2,..., ok} O such that oi+1 in h(oi) for each i =1,..., k, and ok+1= o1.
(See Exercise 5.)
A state v in V of a system is a 4-tuple (b, m, f, h), where b in P(S \times O \times P) indicates which subjects have access to which objects, and what those access rights are; m in M is the access control matrix for the current state; f in F is the 3-tuple indicating the current subject and object clearances and categories; and h in H is the hierarchy of objects for the current state. The difference between b and m is that the rights in m may be unusable because of differences in security levels; b contains the set of rights that may be exercised, and m contains the set of discretionary rights.
R denotes the set of requests for access. The form of the requests affects the instantiation, not the formal model, and is not discussed further here. Four outcomes of each request are possible: y for yes (allowed), n for no (not allowed), i for illegal request, and o for error (multiple outcomes are possible). D denotes the set of outcomes. The set W R \times D \times V \times V is the set of actions of the system. This notation means that an entity issues a request in R, and a decision in D occurs, moving the system from one state in V to another (possibly different) state in V. Given these definitions, we can now define the history of a system as it executes.
Let N be the set of positive integers. These integers represent times. Let X = RN be a set whose elements x are sequences of requests, let Y = DN be a set whose elements y are sequences of decisions, and let Z = VN be a set whose elements z are sequences of states. The ith components of x, y, and z are represented as xi, yi, and zi, respectively. The interpretation is that for some t in N, the system is in state zt 1 in V; a subject makes request xt in R, the system makes a decision yt in D, and as a result the system transitions into a (possibly new) state zt in V.
A system is represented as an initial state and a sequence of requests, decisions, and states. In formal terms, \Sigma (R, D, W, z0) X \times Y \times Z represents the system, and z0 is the initial state of the system. (x, y, z) in \Sigma (R, D, W, z0) if and only if (xt, yt, zt, zt1) in W for all t in N.(x, y, z) is an appearance of \Sigma (R, D, W, z0).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Theory Icdt 97 6th International Conference Delphi Greece January 8 10 1997 Proceedings Lncs 1186

Authors: Foto N. Afrati ,Phokion G. Kolaitis

1st Edition

3540622225, 978-3540622222

More Books

Students also viewed these Databases questions

Question

Explain the steps involved in training programmes.

Answered: 1 week ago

Question

2. Describe how technology can impact intercultural interaction.

Answered: 1 week ago