Confidentiality Models

Slides:



Advertisements
Similar presentations
George Mason University
Advertisements

ACCESS-CONTROL MODELS
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Information Flow and Covert Channels November, 2006.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Lecture 8 Access Control (cont)
I NFORMATION S ECURITY : C ONFIDENTIALITY P OLICIES (C HAPTER 4) Dr. Shahriar Bijani Shahed University.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
Access Control Intro, DAC and MAC System Security.
1 Confidentiality Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 18, 2004.
Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality.
April 20, 2004ECS 235Slide #1 DG/UX System Provides mandatory access controls –MAC label identifies security level –Default labels, but can define others.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality.
Sicurezza Informatica Prof. Stefano Bistarelli
User Domain Policies.
7/15/2015 5:04 PM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 5 September 27, 2007 Security Policies Confidentiality Policies.
Security Policy Models CSC 482/582: Computer Security.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
1 Confidentiality Policies September 21, 2006 Lecture 4 IS 2150 / TEL 2810 Introduction to Security.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 5 Network Security
Slide #5-1 Confidentiality Policies CS461/ECE422 Computer Security I Fall 2010 Based on slides provided by Matt Bishop for use with Computer Security:
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Policy, Models, and Trust
Information Security CS 526 Topic 17
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 5 September 29, 2009 Security Policies Confidentiality Policies.
1/15/20161 Computer Security Confidentiality Policies.
Mandatory Access Control and SE Linux CS 460 Cyber Security Lab Spring ‘10.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Security Models Xinming Ou. Security Policy vs. Security Goals In a mandatory access control system, the system defines security policy to achieve security.
IS 2150/TEL 2810: Introduction of Computer Security1 September 27, 2003 Introduction to Computer Security Lecture 4 Security Policies, Confidentiality.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Verifiable Security Goals
Mandatory Access Control (MAC)
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 5: Confidentiality Policies
Computer Security Confidentiality Policies
Mandatory Access Control (MAC)
IS 2150 / TEL 2810 Introduction to Security
Information Security CS 526 Topic 17
Advanced System Security
Chapter 5: Confidentiality Policies
IS 2150 / TEL 2810 Introduction to Security
DG/UX System Provides mandatory access controls Initially
Confidentiality Policies
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Trust Models CS461/ECE422.
Chapter 5: Confidentiality Policies
Lecture 17: Mandatory Access Control
Chapter 5: Confidentiality Policies
Computer Security Confidentiality Policies
IS 2150 / TEL 2810 Introduction to Security
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 5: Confidentiality Policies
IS 2150 / TEL 2810 Information Security & Privacy
Advanced System Security
Presentation transcript:

Confidentiality Models CSCI283-172 Fall 2006 GWU Draws extensively from: Memon’s notes, Brooklyn Poly Pfleeger Text, Chapter 5 Bishop’s text, Chapter 5, Bishop’s slides, Chapter 5

Types of Security Policies A military security policy (also called government security policy) is a security policy developed primarily to provide confidentiality. Not worrying about trusting the object as much as disclosing the object A commercial security policy is a security policy developed primarily to provide a combination of confidentiality and integrity. Focus on how much the object can be trusted. Also confidentiality policy and integrity policy. 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Security Models To formulate a security policy you have to describe entities it governs and what rules constitute it – a security model does just that! A security model is a model that represents a particular policy or set of policies. Used to: Describe or document a policy Test a policy for completeness and consistency Help conceptualize and design an implementation Check whether an implementation meets requirements. 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

Military Security Policy Heirarchy of sensitivities, e.g.: top secret > secret > confidential > restricted > unclassified Compartments, e.g: Iraq, WMDs, Crypto, non-proliferation, RSA, India, Israel Pieces of Information held by US military, e.g.: Saddam’s location, India’s and Israels’ nuclear capability, security of RSA, published information on RSA, the names of Israel’s cabinet ministers Classify above pieces of information into their classes: <rank; compartments> 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Example from Pfleeger User cleared for: <secret: {dog, cat, pig}> has access to? <top secret; {dog}> <secret; {dog}> <secret; {dog, cow}> <secret; {moose}> <confidential; {dog, pig, cat}> <confidential; {moose}> 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Example Top Secret (TS) | Secret (S) Confidential (C) Unclassified (UC) John Flynn | Monique Tronchin Dianne Martin Bhagi Narahari Strategic Files | Personnel Files Student Files Class Files A basic confidentiality classification system. Security Levels, Subjects, Objects What is the Information Flow? 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Domination Subject s cleared for class <ranks; compartmentss> and Object o is in class <ranko; compartmentso> o dom s iff ranks  ranko and compartmentss  compartmentso o dominates s Military Security Policy: Subject has access to Object iff Subject dominates Object 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

The Bell-La Padula (BLP) Model Formal description of allowable paths of information flow in a secure system, in particular, military security policy – confidentiality. Set of subjects S and objects O. Each subject s in S and o in O has a fixed security class Security classes are ordered by a relation dom Combines mandatory and discretionary access control. 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Examples Consider the subjects: President of the USA Prime Minister of Israel Saddam Hussein Bin Laden Assess their Domination Access wrt the previous examples 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set BLP – Simple Version Information flows up, not down “Reads up” disallowed, “reads down” allowed Simple Security Property: A subject s may have read access to an object o if and only if s dom o 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set BLP – Simple Version Information flows up, not down “Writes down” disallowed, “writes up” allowed *-Property: A subject s who has read access to an object o may have write access to an object p only if p dom o (Contents of a sensitive object can only be written to objects at least as high.). 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

BLP – Simple Version (Contd.) Basic Security Theorem: Let  be a system with a secure initial state 0 and let T be a set of transformations. If every element of T preserves the simple security property and *-property, then every state i i 0 is secure. 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Problem Colonel has (Secret, {NUC, EUR}) clearance Major has (Secret, {EUR}) clearance Major can talk to colonel (“write up” or “read down”) Colonel cannot talk to major (“read up” or “write down”) Clearly absurd! 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Solution Define maximum, current levels for subjects maxlevel(s) dom curlevel(s) Example Treat Major as an object (Colonel is writing to him/her) Colonel has maxlevel (Secret, { NUC, EUR }) Colonel sets curlevel to (Secret, { EUR }) Now L(Major) dom curlevel(Colonel) Colonel can write to Major without violating “no writes down” Does L(s) mean curlevel(s) or maxlevel(s)? Formally, we need a more precise notation: we won’t go much further 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Partial Ordering A partial ordering is a relation  that is reflexive, transitive and anti-symmetric Reflexive – a  a Transitive – If a  b and b  c, then a  c. Anti-symmetric – If a  b and b  a, then a = b. Example: Child of? Sibling of? Identical genetic content? Subset of  ? Divisor of ? Less than equal to  ? dom? 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Lattices A lattice is a collection of tuples (x, y) from a set X where both x and y belong to set A and x  y. Every tuple in the lattice has a greatest upper bound. Every tuple has a least lower bound. Note that not all tuples that can be formed from elements in X belong to the lattice. That is some elements are not comparable (partial ordering). 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Examples Using the following partial orders, define lattices Subset of  ? Divisor of ? Less than equal to  ? 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Lattice - Example G Is B G? Is B E? E F D A B C H J 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set BLP Example: Let NUC, EUR and US be categories. Sets of categories are Null, {NUC}, {EUR}, {US}, {NUC, US}, {NUC, EUR}, {EUR, US} and {NU, EUR, US}. George is cleared for (TOP SECRET, {NUC, US}) A document may be classified as (CONFIDENTIAL, {EUR}). 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set

CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set Example Lattice {NUC, EUR, US} {NUC, US} {EUR, US} {NUC, EUR}, {NUC} {EUR}, {US} The set of categories form a lattice under the subset operation 1/16/2019 CS283-172/Fall06/GWU/Vora Some slides from Bishop's slide set