Skip to content

it-innovation/sam

Folders and files

NameName
Last commit message
Last commit date

Latest commit

4e9cb8f · Feb 7, 2013
Nov 8, 2012
Oct 23, 2012
Dec 6, 2011
Mar 26, 2011
Mar 25, 2011
May 16, 2012
Dec 21, 2011
Nov 24, 2011
Feb 7, 2013
Nov 24, 2011

Repository files navigation

Introduction

The SERSCIS Access Modeller (SAM) takes a model of a system (e.g. a set of objects
within a computer program or a set of machines on a network) and attempts to verify
certain security properties about the system, by exploring all the ways access can
propagate through the system.

It is designed to handle dynamic systems (e.g. systems containing factories
which may create new objects at runtime) and systems where behaviour of some
of the objects is unknown or not trusted.

A typical approach is to model a system initially with most objects having
defined (trusted) behaviour, and then to explore the effects of making them
undefined or of adding additional actors with undefined behaviour into the system.


Documentation

A full manual and tutorial is available in the "doc" directory, or from the SAM
web site:

  http://www.serscis.eu/sam/


Legal issues

See doc/index.rst for copyright and license information.