Automatic Trust Negotiation 1Dennis Kafura – CS5204 – Operating Systems.

Slides:



Advertisements
Similar presentations
Advanced Operating Systems
Advertisements

Advanced Operating Systems
Advanced Operating Systems
Advanced Operating Systems
Advanced Operating Systems Prof. Muhammad Saeed Distributed Operating Systems.
Database Management Systems
2/10/05Salman Azhar: Database Systems1 XML Query Languages Salman Azhar XPATH XQUERY These slides use some figures, definitions, and explanations from.
11 MANAGING DISKS AND FILE SYSTEMS Chapter 3. Chapter 3: Managing Disks and File Systems2 OVERVIEW Monitor and configure disks Monitor, configure, and.
Computer Science 5204 Operating Systems Fall, 2010 Dr. Dennis Kafura Course Overview 1.
Trusted Platform Module
Session 8: Virtual Memory management
Introduction to Database Systems1 Buffer Management Storage Technology: Topic 2.
8. Virtual Memory 8.1 Principles of Virtual Memory
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
CS5204 – Operating Systems 1 A Private Key System KERBEROS.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
University of Amsterdam, Distributed Systems1 Distributed Systems DOAS Marinus Maris.
László Szirmay-Kalos Budapesti University of Technology and Economics Department of Control Engineering and Information Technology and Graphisoft R&D Photorealistic.
State Feedback Controller Design
File Systems 1Dennis Kafura – CS5204 – Operating Systems.
Concurrency Issues Motivation, Problems, Directions Dennis Kafura - CS Operating Systems1.
10/11/2014 5:29 AM4.5 - Matrix Inverse and Solving Systems1 Warm-Up #2 Find the determinants: Use Cramer’s Rule to determine the solution: 3. 6 –2.
Operating Systems1 10. File Systems 10.1 Basic Functions of File Management 10.2 Hierarchical Model of a File System 10.3 User’s View of Files –Logical.
Operating Systems ECE344 Midterm review Ding Yuan
Corso di Sistemi in Tempo Reale Laurea in Ingegneria dell‘Automazione a.a Paolo Pagano
Time Response and State Transition Matrix
Operating Systems1 9. Linking and Sharing 9.1 Single-Copy Sharing –Why Share –Requirements for Sharing –Linking and Sharing 9.2 Sharing in Systems without.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Corso di Sistemi in Tempo Reale Laurea in Ingegneria dell‘Automazione a.a Paolo Pagano
Access Control A Meta-Model 1Dennis Kafura – CS5204 – Operating Systems.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SAFE Implementation Toolkit How to use it. Implementation toolkit Overview Log-in Contents Search Toolkit Use Log-out.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Privacy-Preserving Trust Negotiations Mikhail Atallah Department of Computer Science Purdue University.
1 Using Certified Policies to Regulate E-Commerce Transactions Victoria Ungureanu Rutgers University.
SLIDE 1 Department of Computer Science A flexible access control model for web services Elisa Bertino, Anna Cinzia Squicciarini Lorenzo Martino, Federica.
Use Case Development Scott Shorter, Electrosoft Services January/February 2013.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Trust Negotiation Concepts and Issues Elisa Bertino CS & ECE Departments, CERIAS Purdue University Boston November 9, 2004.
Automatic Trust Negotiation Presented by: Scott Hackman 1Scott Hackman – CS5204 – Operating Systems.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-01.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Trust-X: A Peer-to-Peer Framework for Trust Establishment Elisa Bertino, et.al. Presented by: Carlos Caicedo.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies September 7, 2010.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies June 2011.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Secure Knowledge Management:
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
1 Authentication Celia Li Computer Science and Engineering York University.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Trust Profiling for Adaptive Trust Negotiation
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
SSL Certificates for Secure Websites
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
Cryptography and Network Security
Authentication Applications
Speaker: Sarah Chambers, Esq. Claims Counsel| Professional Liability
Protecting Privacy During On-line Trust Negotiation
Policy Language Requirements for Trust Negotiation
Presentation transcript:

Automatic Trust Negotiation 1Dennis Kafura – CS5204 – Operating Systems

Automatic Trust Negotiation Motivation Two remote interacting parties will disclosure information to each other only when each has established an appropriate level of trust in the other. Elements Remote peers Requester (of a controlled resource) Controller (of a requested resource) Sensitive Information data/services requested by remote peer certificates credentials: issued by trusted third party (e.g, affiliation) declarations: attributes describing peer (e.g., preferences) Negotiation bilateral, incremental exchange leading to an authorization decision Policies drives exchange sequence establish requirements for the disclosure of resources alternative policies may exist for the same resource Dennis Kafura – CS5204 – Operating Systems2

Automatic Trust Negotiation Negotiation Overview Dennis Kafura – CS5204 – Operating Systems3 Requestor Policy Base Controller Policy Base Resource request Policies Subject Profile Resource granted Credentials Slide modified from:

Automatic Trust Negotiation Trust-X Framework Dennis Kafura – CS5204 – Operating Systems4 certificates disclosure policies negotiation engine negotiation state recorded similar prior negotiations

Automatic Trust Negotiation Scenario (A) Employees of Corrier must provide company badge and ID card (B) Others must provide drivers license and credit card Dennis Kafura – CS5204 – Operating Systems5 Rental Car Agency Employees of Corrier Unknown request Policy AB request

Automatic Trust Negotiation Disclosure Policy Dennis Kafura – CS5204 – Operating Systems6 {p 1,…p n }, { R DELIV } { R 1, …, n } preconditionrule terms resource policy P(C) X(C) certificate: variable: condition attr op expr pol 3 = ( {pol 2 }, Rental_Car Credit_Card(name=Rental_Car.name, Rental_Car.ReturnDate < ExpirationDate)); If at least one precondition is met, R can be disclosed if the peer can satisfy the policy terms.

Automatic Trust Negotiation Policy for Scenario Dennis Kafura – CS5204 – Operating Systems7

Automatic Trust Negotiation Negotiation Process Dennis Kafura – CS5204 – Operating Systems8 Controller Requestor RESOURCE DISCLOSURE POLICY EVALUATION PHASE Bilateral disclosure of policies INTRODUCTORY PHASE Preliminary Information exchange CERTIFICATE EXCHANGE Actual credential disclosure Service request Credential and or/Declaration Disclosure policies Service granted Disclosure policies Credential and/or Declaration Slide modified from: Qualifications/preferences

Automatic Trust Negotiation Negotiation Process Dennis Kafura – CS5204 – Operating Systems9 Sequence generation phase Three ways to build trust: 1. Trust tickets 2. Sequence prediction 3. Policy evaluation

Automatic Trust Negotiation 1. Trust Ticket Allows for expedited processing of repeat(ed) requests Certifies that parties have already successfully completed a negotiation for a given resource Issued by each party to the other at the end of a successful negotiation for access to that Reused for subsequent request for that resource Elements Sequence of certificates Validity time Signature of issuer Dennis Kafura – CS5204 – Operating Systems10

Automatic Trust Negotiation 2. Sequence Generation At the end of a successful negotiation for access to resource R, information about the sequence of peer credentials involved in the negotiation can be cached In a subsequent negotiation for resource R, the cached sequence can be retrieved and tested for applicability Useful in cases of repeated forms of negotiation with different parties Dennis Kafura – CS5204 – Operating Systems11

Automatic Trust Negotiation 3. Policy Evaluation Process Incremental exchange of policies driven by the resources each party requires of the other No credentials are exchanged during this phase Begins with initial request for access to resource Ends when One party determines it cannot satisfy the policies of the other, or Both parties believe/claim that they can each satisfy the others policies Elements Negotiation tree – maintains the state of the negotiation Labels - determine subsequent credential exchange order Views path through the negotiation tree trust sequence: a view where all policies are satisfied Dennis Kafura – CS5204 – Operating Systems12

Automatic Trust Negotiation Negotiation Tree Dennis Kafura – CS5204 – Operating Systems13 node: state: open or DELIV owner: RQ (requestor), CN (controller) owner: CN owner: RQ owner: CN

Automatic Trust Negotiation Example Negotiation Tree Dennis Kafura – CS5204 – Operating Systems14

Automatic Trust Negotiation Example Negotiation Tree Dennis Kafura – CS5204 – Operating Systems15

Automatic Trust Negotiation Example Negotiation Tree Dennis Kafura – CS5204 – Operating Systems16

Automatic Trust Negotiation Example Negotiation Tree Dennis Kafura – CS5204 – Operating Systems17

Automatic Trust Negotiation Example Negotiation Tree Dennis Kafura – CS5204 – Operating Systems18 Assume that Certified_service is not controlled by any policy 5 6

Automatic Trust Negotiation Repeated Nodes link nodes referring to the same resource to avoid duplicating exchange/evaluation Dennis Kafura – CS5204 – Operating Systems19

Automatic Trust Negotiation Edge Labels When the precondition for a policy, P, is satisfied, nodes corresponding to P can be added to the negotiation tree The certificates satisfying the precondition policies are used to label the edges for the nodes corresponding to P The edge labels denote the order of credential exchange Dennis Kafura – CS5204 – Operating Systems20