Lecture 3 - DAC and Access Matrices Flashcards

1
Q

DAC?

A

Controls access based on the identity of the requestor and on access rules stating what requestors are and aren’t allowed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is a DAC typically implemented?

A

Access Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is an access matrix decomposed?

A

As it is sparse and hence inefficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decomposition by rows?

A

Capability tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Decomposition by columns?

A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantage of ACLs?

A
  • can contain a default
  • convenient for determining who has access given an object
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disadvantages of ACLs?

A

Not convenient for determining the access rights
available to a specific user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of CTs?

A

Given a user, it is easy to determine the set of
access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages of CTs?

A

Given a specific resource, it is difficult to determine the list of users
with specific access rights
* Tickets may be authorized to loan or given to others, dispersed
around the system —> security problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to solve the security issue with CTs?

A
  • The operating system hold all tickets on behalf of users, but in a
    region of memory inaccessible to users
  • Include an unforgeable token (e.g., a large random pass word, or a
    cryptographic message authentication code) in the capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another way to represent DAC?

A

Authorization Table
- an entry for each subject / object relation access rights

Digraph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a DAC model what is the protection state?

A

set of information at a given point in time that specifies the access rights for each subject with respect to each object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do we have a DAC model?

A

to represent protection state, enforce access rights and allow subjects to alter protection state (and hence rights)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do we need to add to objects to represent the protection state?

A
  • subjects
  • processes
  • devices
  • memory locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access rights are named what in the DAC model?

A

Access attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the model there is seperate access control modules for each type of object? TRUE or FALSE

A

TRUE

17
Q

Steps of accessing something in the model?

A

-subject issues a request of type alpha for X
- request causes system to generate message (S , alpha , X) to controller for X
- controller interrogates A to determine if alpha is in A[S ,X] and responds depending on access matrix

18
Q

No one can modify the access matrix in the model. TRUE or FALSE

A

FALSE, possible by certain subjects through the access matrix controller with access control system commands

19
Q

What is the copy flag?

A

a access attribute that allows transferring of that attribute with/without flag to another subject