Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters19 (3):151-156,1984.Type:Article
Date Reviewed: Jun 1 1985

The author studies five variants of the take/grant model:

  • (1) no create rule;

  • (2) a create-take-only rule;

  • (3) a create-grant-only rule;

  • (4) a create-take-grant rule (the original model); and

  • (5) no create rule but a self-grant rule (the original model prohibits subjects from acquiring self rights).

The results are that (2) yields no additional power over (1); (3) yields additional power over (1) and (2), but does not have equal power to (4); and (5) has equal power to (4). This appears to be a useful result since the creation of subjects and/or objects for the purpose of passing rights can be very inefficient.

Reviewer:  Glenn H. MacEwen Review #: CR109130
Bookmark and Share
 
Access Controls (D.4.6 ... )
 
 
Graph Algorithms (G.2.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
Controls for interorganization networks
Estrin D. IEEE Transactions on Software Engineering SE-13(2): 249-261, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy