1 TOPIC SYSTEM Z Ravi Sandhu This lecture is primarily based on: John McLean, Roger R. Schell and Donald L. Brinkley, "Security Models." Encyclopedia of.

Slides:



Advertisements
Similar presentations
ACCESS-CONTROL MODELS
Advertisements

Symmetric Message Authentication Codes Prof. Ravi Sandhu.
ROLE HIERARCHIES AND CONSTRAINTS FOR LATTICE-BASED ACCESS CONTROLS
Information Flow and Covert Channels November, 2006.
1 COVERT CHANNELS Ravi Sandhu. 2 COVERT CHANNELS A covert channel is a communication channel based on the use of system resources not normally intended.
CMSC 414 Computer (and Network) Security Lecture 12 Jonathan Katz.
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
Bell-LaPadula Model. Why Security Models?  When we have implemented a security policy, do we know that it will (and can) be.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Verifiable Security Goals
Robust Declassification Steve Zdancewic Andrew Myers Cornell University.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Midterm Tuesday October 23 Covers Chapters 3 through 6 - Buses, Clocks, Timing, Edge Triggering, Level Triggering - Cache Memory Systems - Internal Memory.
Processor Architecture Kieran Mathieson. Outline Memory CPU Structure Design a CPU Programming Design Issues.
MT Computer Security - Models & Policies
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
1 TOPIC THE CHINESE WALL LATTICE Ravi Sandhu. 2 CHINESE WALL POLICY Example of a commercial security policy for confidentiality Mixture of free choice.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
7/16/2015 3:58 AM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
G53SEC 1 Reference Monitors Enforcement of Access Control.
1 Security Policy Models The Bell- LaPadula Model Elisabeth C. Sullivan CSE527.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
C o n f i d e n t i a l 1 Course: BCA Semester: III Subject Code : BC 0042 Subject Name: Operating Systems Unit number : 1 Unit Title: Overview of Operating.
Slide #5-1 Confidentiality Policies CS461/ECE422 Computer Security I Fall 2010 Based on slides provided by Matt Bishop for use with Computer Security:
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Computer Security 3e Dieter Gollmann
12/4/20151 Computer Security Security models – an overview.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 26 Review of Some Mid-Term Problems.
AUTHORS – X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY Design and Implementation of Security Operating System based.
Information Security CS 526 Topic 17
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
1/15/20161 Computer Security Confidentiality Policies.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Senem KUMOVA METİN // Fall CS 115 Introduction to Programming Introduction to Computing.
L o g o Modern DBMSs security problems Nguyen Chi Thanh Nguyen Thanh Toan Group:
CS 1308 Exam 2 Review. Exam Format 110 Total Points 24 Points Short Answer 28 Points Fill in the Blank 16 Points T/F 36 Points Multiple Choice The above.
Introduction to Operating Systems Prepared by: Dhason Operating Systems.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Access Control Models Sandro Etalle slides by Daniel Trivellato.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
TOPIC: Web Security Models
Verifiable Security Goals
Mandatory Access Control (MAC)
Jeremy R. Johnson Mon. Apr. 3, 2000
Executive Director and Endowed Chair
Basic Security Theorem
Computer Security Confidentiality Policies
Mandatory Access Control (MAC)
Cryptography Lecture 10.
Information Security CS 526
Information Security CS 526 Topic 17
Information Security CS 526
Week1 software - Lecture outline & Assignments
Computer Security Confidentiality Policies
Information Security CS 526
Cryptography Lecture 9.
Computer Electronic device Accepts data - input
DOMAIN TYPE ENFORCEMENT
Presentation transcript:

1 TOPIC SYSTEM Z Ravi Sandhu This lecture is primarily based on: John McLean, Roger R. Schell and Donald L. Brinkley, "Security Models." Encyclopedia of Software Engineering,

2 BLP S, fixed set of subjects O, fixed set of objects L, fixed lattice of security labels F: S U O → L, assignment of security labels to subjects and objects M: S X O → 2 {read,write}, access matrix, system state V is set of all possible system states A system consists of –An initial state v 0 –A set of requests R –A state transition function T: V X R → V

3 BLP is read secure (simple security) iff for all s, o read in M[s,o] → F(s) ≥ F(o) is write secure (star-property) iff for all s, o write in M[s,o] → F(s) ≤ F(o) is state secure iff it is read secure and write secure

4 BLP BASIC SECURITY THEOREM (BST)

5 BLP WITH TRANQUILITY F does not change F v (s) = F v0 (s) F v (o) = F v0 (o) BLP with tranquility is intuitively secure BLP with tranquility satisfies BST and thereby is formally “secure” BUT System Z is intuitively (and egregiously) insecure System Z satisfies BST so BST is useless

6 SYSTEM Z Initial state v 0 is state secure Single transition rule: on any read or write request all subjects and objects are downgraded to system low and the access is allowed System Z satisfies Basic Security Theorem

7 BLP WITH HIGH WATER MARK F(o) does not change, F v (o) = F v0 (o) F(s) can change but –only upwards, F v (s) ≥ F v0 (s) –only as far as user’s clearance, F v (s) ≤ F(user(s)) –every change upwards in F(s) requires removal of write from M[s,o] cells where after the change F(s) > F(o) BLP with high water mark is considered intuitively secure (and also satisfies BST)

8 BLP WITH LOW WATER MARK F(o) does not change, F v (o) = F v0 (o) F(s) can change but –only downwards, F v (s) ≤ F v0 (s) –can downgrade all the way to system low –every change downwards in F(s) requires removal of read from M[s,o] cells where after the change F(s) < F(o) BLP with low water mark is considered intuitively insecure (and also satisfies BST) –memory of higher level reads can be retained in RAM, cache, CPU registers, program counter, etc

9 NON-INTERFERENCE Views the system as a black box with input/output events that are caused by users McLean’s paper assigns an input event the same level as the user’s clearance. This is not correct. More correctly an input event can be caused by a user but its security level should be specifiable by the user. Reasonably intuitive and intuitively secure for deterministic systems For non-deterministic systems it pushes intuition boundaries

10 NON-INTERFERENCE time Inputs Outputs HLLHHLHH HHHLLHL

11 NON-INTERFERENCE time Inputs Outputs HLLHHLHH LLL

12 NON-INTERFERENCE time Inputs Outputs LLL LLL

13 NON-INTERFERENCE

14 NON-INTERFERENCE

15 NON-INTERFERENCE vs BLP Generally understood that non-interference can deal with storage covert channels but not with timing covert channels

16 NON-INTERFERENCE AND ENCRYPTION XOR XV Y X: plaintext V: encryption key (one-time pad) Y: ciphertext