We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMadison Romero
Modified over 2 years ago
© Ravi Sandhu Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2004 Ravi Sandhu 2 Outline Perspective on security Role Based Access Control (RBAC) Objective Model-Architecture Mechanism (OM-AM) Framework Usage Control (UCON) Discussion
© Ravi Sandhu PERSPECTIVE
© 2004 Ravi Sandhu 4 Security Conundrum Nobody knows WHAT security is Some of us do know HOW to implement pieces of it Result: hammers in search of nails
© 2004 Ravi Sandhu 5 Security Confusion INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose electronic commerce, electronic business DRM, client-side controls
© 2004 Ravi Sandhu 6 Security Successes On-line banking On-line trading Automatic teller machines (ATMs) GSM phones Set-top boxes ……………………. Success is largely unrecognized by the security community
© 2004 Ravi Sandhu 7 Good enough security Exceeding good enough is not good You will pay a price in user convenience, ease of operation, cost, performance, availability, … There is no such thing as free security Determining good enough is hard Necessarily a moving target
© 2004 Ravi Sandhu 8 Good enough security EASY SECURE COST Security geeksReal-world users System owner whose security perception or reality of security end users operations staff help desk system cost operational cost opportunity cost cost of fraud Business models dominate security models
© 2004 Ravi Sandhu 9 Good enough security In many cases good enough is achievable at a pretty low threshold The entrepreneurial mindset In extreme cases good enough will require a painfully high threshold The academic mindset
© 2004 Ravi Sandhu 10 Good enough security RISKRISK COST H M L LMH Entrepreneurial mindset Academic mindset
© Ravi Sandhu ROLE-BASED ACCESS CONTROL (RBAC)
© 2004 Ravi Sandhu 12 MAC, DAC and RBAC For 25 years ( ) access control was divided into Mandatory Access Control (MAC) Discretionary Access Control (DAC) Since the early-mid 1990s Role-Based Access Control (RBAC) has become a dominant force RBAC subsumes MAC and DAC RBAC is not the final answer BUT is a critical piece of the final answer
© 2004 Ravi Sandhu 13 Mandatory Access Control (MAC) TS S C U Information Flow Dominance Lattice of security labels Rights are determined by security labels (Bell-LaPadula 1971)
© 2004 Ravi Sandhu 14 Discretionary Access Control (DAC) The owner of a resource determines access to that resource The owner is often the creator of the resource Fails to distinguish read from copy This distinction has re-emerged recently under the name Dissemination Control (DCON)
© 2004 Ravi Sandhu 15 RBAC96 model (Currently foundation of a NIST/ANSI/ISO standard) ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS
© 2004 Ravi Sandhu 16 RBAC SECURITY PRINCIPLES least privilege separation of duties separation of administration and access abstract operations
© 2004 Ravi Sandhu 17 HIERARCHICAL ROLES Health-Care Provider Physician Primary-Care Physician Specialist Physician
© 2004 Ravi Sandhu 18 Fundamental Theorem of RBAC RBAC can be configured to do MAC RBAC can be configured to do DAC RBAC is policy neutral
© Ravi Sandhu OM-AM (Objective/Model Architecture/Mechanism) Framework
© 2004 Ravi Sandhu 20 THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance
© 2004 Ravi Sandhu 21 LAYERS AND LAYERS Multics rings Layered abstractions Waterfall model Network protocol stacks Napolean layers RoFi layers OM-AM etcetera
© 2004 Ravi Sandhu 22 OM-AM AND MANDATORY ACCESS CONTROL (MAC) What? How? No information leakage Lattices (Bell-LaPadula) Security kernel Security labels AssuranceAssurance
© 2004 Ravi Sandhu 23 OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC) What? How? Owner-based discretion numerous ACLs, Capabilities, etc AssuranceAssurance
© 2004 Ravi Sandhu 24 OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC) What? How? Objective neutral RBAC96, ARBAC97, etc. user-pull, server-pull, etc. certificates, tickets, PACs, etc. AssuranceAssurance
© 2004 Ravi Sandhu 25 RBAC96 model (Currently foundation of a NIST/ANSI/ISO standard) ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS
© 2004 Ravi Sandhu 26 Server-Pull Architecture ClientServer User-role Authorization Server
© 2004 Ravi Sandhu 27 User-Pull Architecture ClientServer User-role Authorization Server
© 2004 Ravi Sandhu 28 Proxy-Based Architecture ClientServer Proxy Server User-role Authorization Server
© Ravi Sandhu USAGE CONTROL (UCON)
© 2004 Ravi Sandhu 30 The UCON Vision: A unified model Traditional access control models are not adequate for todays distributed, network- connected digital environment. Authorization only – No obligation or condition based control Decision is made before access – No ongoing control No consumable rights - No mutable attributes Rights are pre-defined and granted to subjects
© 2004 Ravi Sandhu 31 OM-AM layered Approach
© 2004 Ravi Sandhu 32 Prior Work Problem-specific enhancement to traditional access control Digital Rights Management (DRM) –mainly focus on intellectual property rights protection. –Architecture and Mechanism level studies, Functional specification languages – Lack of access control model Trust Management –Authorization for strangers access based on credentials
© 2004 Ravi Sandhu 33 Prior Work Incrementally enhanced models Provisional authorization [Kudo & Hada, 2000] EACL [Ryutov & Neuman, 2001] Task-based Access Control [Thomas & Sandhu, 1997] Ponder [Damianou et al., 2001]
© 2004 Ravi Sandhu 34 Usage Control (UCON) Coverage Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor (SRM) Client-side reference monitor (CRM) Both SRM and CRM
© 2004 Ravi Sandhu 35 Core UCON (Usage Control) Models ongoing postpre Continuity of decisions Mutability of attributes
© 2004 Ravi Sandhu 36 Examples Long-distance phone (pre-authorization with post- update) Pre-paid phone card (ongoing-authorization with ongoing-update) Pay-per-view (pre-authorization with pre-updates) Click Ad within every 30 minutes (ongoing- obligation with ongoing-updates) Business Hour (pre-/ongoing-condition)
© 2004 Ravi Sandhu 37 Beyond the UCON Core Models
© 2004 Ravi Sandhu 38 UCON Architectures We narrow down our focus so we can discuss in detail how UCON can be realized in architecture level Sensitive information protection X CRM First systematic study for generalized security architectures for digital information dissemination Architectures can be extended to include payment function
© 2004 Ravi Sandhu 39 Three Factors of Security Architectures Virtual Machine (VM) runs on top of vulnerable computing environment and has control functions Additional assurance will come with emerging hardware support Control Set (CS) A list of access rights and usage rules Fixed, embedded, and external control set Distribution Style Message Push (MP), External Repository (ER) style
© 2004 Ravi Sandhu 40 Architecture Taxonomy VM: Virtual Machine CS: Control Set MP: Message Push ER: External Repository NC1: No control architecture w/ MP NC2: No control architecture w/ ER FC1: Fixed control architecture w/ MP FC2: Fixed control architecture w/ ER EC1: Embedded control architecture w/ MP EC2: Embedded control architecture w/ ER XC1: External control architecture w/ MP XC2: External control architecture w/ ER
© Ravi Sandhu RESEARCH TOPICS
© 2004 Ravi Sandhu 42 RESEARCH TOPICS OM-AM, RBAC, UCON Previously discussed Trusted computing Hardware-based trust on the client side Dissemination control Discretionary access control done correctly Application-layer security Cant escape it Security as a tool for enterprise risk management Reconciling financial, reputational and regulatory risk with business models Security in a world of pervasive computing A comfort zone for users in a brave new world New security gizmos, widgets and protocols A never ending quest
Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2004 Ravi Sandhu Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology.
Usage Control: UCON Ravi Sandhu. © Ravi Sandhu2 Problem Statement Traditional access control models are not adequate for todays distributed, network-
© 2004 Ravi Sandhu Role-Based Access Control Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
OM-AM and RBAC Ravi Sandhu * Laboratory for Information Security Technology (LIST) George Mason University.
© 2004 Ravi Sandhu A Perspective on Graphs and Access Control Models Ravi Sandhu Laboratory for Information Security Technology George.
Usage Control: A Vision for Next Generation Access Control Oct 14, 2003 Ravi Sandhu and Jaehong Park (www.list.gmu.edu) Laboratory for Information Security.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
Information Assurance: A Personal Perspective Ravi Sandhu
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
© Ravi Sandhu The Secure Information Sharing Problem and Solution Approaches Ravi Sandhu Professor of Information Security and Assurance.
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Role-Based Access Control Prof. Ravi Sandhu George Mason University and NSD Security SACMAT 2003.
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
Attribute Mutability in Usage Control July 26, 2004, IFIP WG11.3 Jaehong Park, University of Maryland University College Xinwen Zhang, George Mason University.
Security Architectures for Controlled Digital Information Dissemination Laboratory for Information Security Technology (LIST)
1 PEI Models towards Scalable, Usable and High-assurance Information Sharing Ram Krishnan Laboratory for Information Security Technology George Mason University.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
7- Sicurezza delle basi di dati. 2 Sommario 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
SharePoint Governance Questions January 2014 ©2014 SUSAN HANLEY LLC.
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
© 2016 SlidePlayer.com Inc. All rights reserved.