INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

Cyber-Identity, Authority and Trust in an Uncertain World
© Ravi Sandhu The Secure Information Sharing Problem and Solution Approaches Ravi Sandhu Professor of Information Security and Assurance.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY April Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
INSTITUTE FOR CYBER SECURITY 1 The PEI + UCON Framework for Application Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 PEI Models towards Scalable, Usable and High-assurance Information Sharing Ram Krishnan Laboratory for Information Security Technology George Mason University.
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Institute for Cyber Security
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
A THREE TIER ARCHITECTURE FOR ROLE-BASED ACCESS CONTROL Ravi Sandhu and Hal Feinstein Seta Corporation McLean, VA Ongoing NIST-funded project Other Project.
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Operating Systems Protection Alok Kumar Jagadev.
Past, Present and Future
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control: Insights and Challenges
Executive Director and Endowed Chair
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control: Insights and Challenges
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Access Control What’s New?
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June

INSTITUTE FOR CYBER SECURITY Change Drivers Stand-alone computersInternet Enterprise security Mutually suspicious yet mutually dependent security VandalsCriminals, Nation states, Terrorists Few standard services Many and new innovative services

INSTITUTE FOR CYBER SECURITY 3 Basic Assumptions (Axioms) Information needs to be protected In motion At rest In use Absolute security is impossible and unnecessary Trying to approximate absolute security is a bad strategy Good enough security is feasible and meaningful Security is meaningless without application context Cannot know we have good enough without this context Models and abstractions are all important Without a conceptual framework it is hard to separate what needs to be done from how we do it We are not very good at doing any of this

INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers

INSTITUTE FOR CYBER SECURITY Access Control Models Discretionary Access Control (DAC) Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Access based on security labels Labels propagate to copies Role-Based Access Control (RBAC) Access based on roles Can be configured to do DAC or MAC Attribute-Based Access Control (ABAC) Access based on attributes, to possibly include roles, security labels and whatever 5

INSTITUTE FOR CYBER SECURITY Usage Control Model (UCON) unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes

INSTITUTE FOR CYBER SECURITY What makes UCON different? UCON is an attribute-based authorization model BUT Attributes are mutable, in that the system updates them automatically as a result of usage Allows count-limited, rate-limited, quota-limited policies to be expressed and enforced E.g., can access upto 10 documents per hour Access may require explicit actions by the user attempting access, other users or the system Enables human-in-the-loop just-in-time decisions E.g., access requires confirmation by a superior officer Enables notification of access E.g., access is notified to a designated audit authority Enables clean-up after access is completed E.g., delete cryptographic keys, plaintext content Access can depend on system condition and mode E.g., in emergency mode access is enabled (or disabled) Access mediation can continue while access is in progress E.g., if credentials are revoked access is immediately terminated E.g., if system mode changes from normal to emergency access is terminated 7

INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers

INSTITUTE FOR CYBER SECURITY 9 Policy Model Initial state: Never been a member State I Currently a member State II Past member State III enrolldis- enroll enroll 1. Straight-forward. User has no access to any group documents. 1. Access to current documents only (or) 2. Access to current documents and past documents 3. Access can be further restricted with rate and/or usage limits 4. Access can be further restricted on basis of individual user credentials 1. Past member loses access to all documents (or) 2. can access any document created during his membership (or) 3. can access documents he accessed during membership (or) 4. can access all documents created before he left the group (this includes the ones created before his join time) 5. all subject to possible additional rate, usage and user credential restrictions 1. No rejoin of past members is allowed, rejoin with new ID (or) 2. Past members rejoin the group just like any other user who has never been a member 3. The same access policies defined during his prior membership should again be enforced (or) 4. access policies could vary between membership cycles

INSTITUTE FOR CYBER SECURITY 10 Policy Model Initial state: Never been a group doc State I Currently a group doc State II Past group doc State III addremove add 1. Straight-forward. No access to group members. 1. Access allowed only to current group members 2. Access allowed to current and past group members 1. No one can access 2. Any one can access 3. Past members can access 1. Cannot be re-added. 2. When a document is re-added, it will be treated as a new document that is added into the group. 3. Only current members can access. 4. Past members and current members can access

INSTITUTE FOR CYBER SECURITY 11 Enforcement Model Group-AdminMember Joining Member Control Center (CC) 7 Ideal Model: steps 3 and 4 are coupled Approximate Model: steps 3 and 4 are de-coupled D-Member 6 Member enroll and dis-enroll (steps 1-2, 5) Document add and remove (step 6, 7) Read policy enforcement (step 3) Attribute update (step 4) Two sets of attributes Authoritative: as known to the CC Local: as known on a members computer

INSTITUTE FOR CYBER SECURITY 12 Implementation Model Use TC mechanisms to bind group key + attributes to TRM

INSTITUTE FOR CYBER SECURITY Trusted Computing Technology Need crypto and access control Requirements Hide the root keys Authorize use of root keys Wrt software Wrt people Curtained memory Remote attestation Translation of policy E.g., Policy in XACML to policy in SELinux 13

INSTITUTE FOR CYBER SECURITY Conclusion Some very interesting challenges ahead and some very exciting research to be done Requires collaboration between Domain experts Technology experts Security experts 14