author | Christian Urban <christian dot urban at kcl dot ac dot uk> |
Mon, 23 Sep 2013 14:59:28 +0100 | |
changeset 95 | e24f6c12839e |
parent 91 | e6b34594d1e5 |
permissions | -rw-r--r-- |
63 | 1 |
\documentclass{article} |
2 |
\usepackage{charter} |
|
3 |
\usepackage{hyperref} |
|
4 |
\usepackage{amssymb} |
|
5 |
||
6 |
\begin{document} |
|
7 |
||
8 |
\section*{Homework 6} |
|
9 |
||
10 |
\begin{enumerate} |
|
11 |
\item Access-control logic includes formulas of the form |
|
12 |
\begin{center} |
|
13 |
$P\;\textit{says}\;F$ |
|
14 |
\end{center} |
|
15 |
||
16 |
where $P$ is a principal and $F$ a formula. Give two inference rules |
|
17 |
of access-control logic involving $\textit{says}$. |
|
18 |
||
74
fb14a8e1b00d
added hw 7
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
63
diff
changeset
|
19 |
\item (Removed) Was already used in HW 5 |
63 | 20 |
|
21 |
\item |
|
22 |
Assume an access control logic with security levels, say top secret ({\it TS}), |
|
23 |
secret ({\it S}) and public ({\it P}), with |
|
24 |
\begin{center} |
|
25 |
$slev(\textit{P}) < slev(\textit{S}) < slev(\textit{TS})$ |
|
26 |
\end{center} |
|
27 |
||
28 |
(a) Modify the formula |
|
29 |
\begin{center} |
|
30 |
\begin{tabular}{l} |
|
31 |
$P\;\textit{controls}\;\textit{Permitted}(O, \textit{write})$\\ |
|
32 |
\end{tabular} |
|
33 |
\end{center} |
|
34 |
using security levels so that it satisfies the {\it write rule} from the {\it |
|
35 |
Bell-LaPadula} access policy. Do the same again, but satisfy the {\it write rule} |
|
36 |
from the {\it Biba} access policy. |
|
37 |
||
38 |
(b)Modify the formula |
|
39 |
\begin{center} |
|
40 |
\begin{tabular}{l} |
|
41 |
$P\;\textit{controls}\;\textit{Permitted}(O, \textit{read})$\\ |
|
42 |
\end{tabular} |
|
43 |
\end{center} |
|
44 |
using security levels so that it satisfies the {\it read rule} from the {\it |
|
45 |
Bell-LaPadula} access policy. Do the same again, but satisfy the {\it read rule} |
|
46 |
from the {\it Biba} access policy. |
|
47 |
||
48 |
\item Assume two security levels $\textit{S}$ and $\textit{TS}$, which are ordered so that $slev(\textit{S}) < slev(\textit{TS})$. |
|
49 |
Assume further the substitution rules |
|
50 |
\begin{center} |
|
51 |
\begin{tabular}{c} |
|
52 |
$\Gamma \vdash slev(P) = l_1$ \hspace{4mm} $\Gamma \vdash slev(Q) = l_2$ |
|
53 |
\hspace{4mm} $\Gamma \vdash l_1 < l_2$\\\hline |
|
54 |
$\Gamma \vdash slev(P) < slev(Q)$ |
|
55 |
\end{tabular} |
|
56 |
\end{center} |
|
57 |
||
58 |
\begin{center} |
|
59 |
\begin{tabular}{c} |
|
60 |
$\Gamma \vdash slev(P) = l$ \hspace{4mm} $\Gamma \vdash slev(Q) = l$\\\hline |
|
61 |
$\Gamma \vdash slev(P) = slev(Q)$ |
|
62 |
\end{tabular} |
|
63 |
\end{center} |
|
64 |
||
65 |
Let $\Gamma$ be the set containing the following six formulas |
|
66 |
\begin{center} |
|
67 |
\begin{tabular}{l} |
|
68 |
\\ |
|
69 |
$slev(\textit{S}) < slev(\textit{TS})$\smallskip\\ |
|
91
e6b34594d1e5
typo
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
74
diff
changeset
|
70 |
$slev(\textit{Agent}) = slev(\textit{TS})$\smallskip\\ |
e6b34594d1e5
typo
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
74
diff
changeset
|
71 |
$slev(\textit{File}_1) = slev(\textit{S})$\smallskip\\ |
e6b34594d1e5
typo
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
74
diff
changeset
|
72 |
$slev(\textit{File}_2) = slev(\textit{TS})$\smallskip\\ |
63 | 73 |
$\forall O.\;slev(O) < slev(\textit{Agent}) \Rightarrow |
74 |
(\textit{Agent}\;\textit{controls}\;\textit{Permitted}(O, \textit{read}))$\smallskip\\ |
|
75 |
$\forall O.\;slev(O) = slev(\textit{Agent}) \Rightarrow |
|
76 |
(\textit{Agent}\;\textit{controls}\;\textit{Permitted}(O, \textit{read}))$\\ |
|
77 |
\\ |
|
78 |
\end{tabular} |
|
79 |
\end{center} |
|
80 |
Using the inference rules of access-control logic and the substitution rules shown above, |
|
81 |
give proofs for the two judgements |
|
82 |
\begin{center} |
|
83 |
\begin{tabular}{l} |
|
84 |
$\Gamma \vdash |
|
85 |
(\textit{Agent}\;\textit{says}\;\textit{Permitted}(\textit{File}_1, |
|
86 |
\textit{read})) \Rightarrow \textit{Permitted}(\textit{File}_1, \textit{read})$\smallskip\\ |
|
87 |
$\Gamma \vdash |
|
88 |
(\textit{Agent}\;\textit{says}\;\textit{Permitted}(\textit{File}_2, |
|
89 |
\textit{read})) \Rightarrow \textit{Permitted}(\textit{File}_2, \textit{read})$\\ |
|
90 |
\end{tabular} |
|
91 |
\end{center} |
|
92 |
||
93 |
\end{enumerate} |
|
94 |
\end{document} |
|
95 |
||
96 |
%%% Local Variables: |
|
97 |
%%% mode: latex |
|
98 |
%%% TeX-master: t |
|
99 |
%%% End: |