Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.

Slides:



Advertisements
Similar presentations
Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
Advertisements

Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
Towards A Times-based Usage Control Model Baoxian Zhao 1, Ravi Sandhu 2, Xinwen Zhang 3, and Xiaolin Qin 4 1 George Mason University, Fairfax, VA, USA.
Lecture & 6.6 Inclusion-Exclusion. 6.5 Inclusion-Exclusion A AB U It’s simply a matter of not over-counting the blue area in the intersection.
Rule based Trust management using RT - second lecture Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio.
L41 Lecture 2: Predicates and Quantifiers.. L42 Agenda Predicates and Quantifiers –Existential Quantifier  –Universal Quantifier 
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
Bundling Equilibrium in Combinatorial Auctions Written by: Presented by: Ron Holzman Rica Gonen Noa Kfir-Dahav Dov Monderer Moshe Tennenholtz.
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
The Design and Implementation of a Certifying Compiler [Necula, Lee] A Certifying Compiler for Java [Necula, Lee et al] David W. Hill CSCI
Sponsored by the National Science Foundation GENI Clearinghouse Panel GEC 12 Nov. 2, 2011 INSERT PROJECT REVIEW DATE.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Trust Management II Anupam Datta Fall A: Foundations of Security and Privacy.
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
Winter 2004/5Pls – inductive – Catriel Beeri1 Inductive Definitions (our meta-language for specifications)  Examples  Syntax  Semantics  Proof Trees.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
First Practice - Information Security Management System Implementation and ISO Certification.
Partnering & Strategic Alliances
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
CS590U Access Control: Theory and Practice Lecture 21 (April 11) Distributed Credential Chain Discovery in Trust Management.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Rule based Trust management using RT Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio. The DTM team.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Ninghui Li (Purdue University) 2 nd Int’l Summer School in Computation Logic June 17, 2004 Logic and Logic Programming in Distributed Access Control (Part.
Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Team Roles. Logvinovich Kristina BTK91. Meredith Belbin. Meredith Belbin is a British researcher and management theorist, best known for his work on management.
On Reducing the Global State Graph for Verification of Distributed Computations Vijay K. Garg, Arindam Chakraborty Parallel and Distributed Systems Laboratory.
Moving From Expectations to Performance Standards.
COMP 111 Threads and concurrency Sept 28, Tufts University Computer Science2 Who is this guy? I am not Prof. Couch Obvious? Sam Guyer New assistant.
Reading and Writing Mathematical Proofs Spring 2015 Lecture 4: Beyond Basic Induction.
PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision.
22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester /04/2004 Daniel Olmedilla L3S / University.
More on Description Logic(s) Frederick Maier. Note Added 10/27/03 So, there are a few errors that will be obvious to some: So, there are a few errors.
Interagency Collaboration: Transition’s Reality Show Sharon deFur Jeanne Repetto coe.ufl.edu.
CS201: Data Structures and Discrete Mathematics I
Computer Science 1 Mining Likely Properties of Access Control Policies via Association Rule Mining JeeHyun Hwang 1, Tao Xie 1, Vincent Hu 2 and Mine Altunay.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Introduction to Access Control and Trust Management Daniel Trivellato.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
1 Reasoning with Infinite stable models Piero A. Bonatti presented by Axel Polleres (IJCAI 2001,
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Understanding deployment issues on the Supply Chain Ann Harding, SWITCH, Nicole Harris, TERENA Cambridge July 2014.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Authorization Sec PAL: A Decentralized Authorization Language.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Decentralized Access Control: Overview Deepak Garg Foundations of Security and Privacy Fall 2009.
Foundations of Group Behavior Week 6 lecture 11,12.
Decentralized Access Control: Policy Languages and Logics
Tactic 1: Adopt Least Privilege
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
Partnership Delivery Team
Prepared by: Miss Samah Ishtieh
Beyond Proof-of-compliance: Security Analysis in Trust Management
Cooperative Learning Concepts
Market surveillance cooperation at European level
Protecting Privacy During On-line Trust Negotiation
Presentation transcript:

Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio. The DTM team of the UT (Marcin, Jeroen, Jerry). And the many people I’ve taken ideas from for this lecture (Winslett, Li, Seamons…)

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 2 Summary: A, B, D: principals r, r1, r2: role names A.r: a role (a principal + a role name) Four types of credentials:  A.r  D Role A.r contains principal D as a member  A.r  B.r 1 A.r contains role B.r 1 as a subset  A.r  A.r 1.r 2 A.r  B.r 2 for each B in A.r 1  A.r  A 1.r 1  A 2.r 2 A.r contains the intersection

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 3 Example: find the semantics Alice.s  Alice.u.v Alice.u  Bob Bob.v  Charlie Bob.v  Charlie.s What is the semantics?

Back to expressivity issues

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 5 Back to expressivity issues In the Flexible Company FC, a buyer may also be an accountant, provided that his/her behaviour is logged. How do we do this?

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 6 First way of solving this Use negation in the policies  FC.acc  FC.acc2 – FC.buyer  FC.acc  FC.acc2  FC.buyer  FC.log  FC.acc2  Accrinst.approved  … But negation is nonmonotonic.  What is nonmonotonicity?  What is the problem with nonmonotonicity?  How do we deal with this?

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 7 A personal view on negation in TM. Negation is good provided that  It is always in a context GOOD: all doctors that don’t have a specialty BAD: all non-doctors.  The negated predicate should rely on a definition we can “count on” Eg: FC.acc  FC.acc2 – FC.buyer FC should be able to tell who populates FC.buyer without having to beg around for credentials. See paper by Czenko et. al  (yes, I confess, I am one of the authors).

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 8 A second way of solving this Using an integrity constraint. FC.log ⊒ FC.buyer  FC.accountant Need a mechanism to monitor it. External to the RT system.  See Etalle & Winsborough…

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 9 Why Integrity Constraints Policies do change: P  P 1 ...  P n A principal controls only a portion of the policy  Statements may be added or removed by other principals  nowadays: trusted principals give no feedback to the trusting ones Delegating trust implies an understanding between principals,  nowadays: not formalized Trusted principals need assistance in understanding global impact of delegations, revocations  Who could get access to what? (Safety) Assessing exposure  Who could be denied? (Availability) Ensuring applications have authorizations needed for correct operation

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 10 Problem Instances “No-one should ever be both a buyer and an accountant”  Mutual Exclusion “Welders of BOVAG-accredited workshops should be fellows of the British Institute of Welding”  Containment “Every employee should have access to the WLAN network”  Containment, Availability

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 11 Integrity Constraints: General Form General: L.l ⊒ R.r  L.l ⊒ R.r holds in P iff [[L.l]] P  [[R.r]] P  L.l and R.r may be sets and intersections of roles Special cases  Membership: A.r ⊒ { D 1, …, D n }  Boundedness: { D 1, …, D n } ⊒ A.r  expressiveness is limited (it is a universal formula) but we can express all safety properties of [LWM03]  counterexample: at least a manager should have access to the DB

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 12 Exercise: find the right constraint: buyers and accountants should be disjoint every employee should have access to the WLAN network welders of BOVAG-accredited workshops should be fellows of the British Institute of Welding Bovag.welder  Bovag.accr.welder Bovag.accr  PietersWorkshop PietersWorkshop.welder  Pieter

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 13 Answers buyers and accountants should be disjoint   ⊒ A.buyer  A.accountant every employee should have access to the WLAN network  WLAN.access ⊒ UT.employee welders of BOVAG-accredited workshops should be fellows of the British Institute of Welding Bovag.welder  Bovag.accr.welder Bovag.accr  PietersWorkshop PietersWorkshop.welder  Pieter  BIW.fellow ⊒ Bovag.welder

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 14 The technical problem (a taste of research) P  P1 ...  Pn: policy change L.l ⊒ R.r: a constraint Need a (minimal) mechanism such that  IF L.l ⊒ R.r does not hold in Pi  THEN a warning is fired  without checking L.l ⊒ R.r each time a credential is added/removed How: by monitoring when some credentials are added or removed

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 15 The solution in short P – policy, Q = L.l ⊒ R.r – IC Define 2 set of roles:  G = roles R.r depends on  S = roles satisfying [[L.l]] P|S  [[R.r]] P Theorem: Let P  P1 ...  Pn IF  P satisfies Q  no credential S is removed  no credential for G is added THEN  Pn satisfies Q  G and S don’t have to be recomputed

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 16 The method P – policy, Q = L.l ⊒ R.r: constraint CHECKING FIRST, compute [[R.r]] P  here G is computed “for free” THEN, for each X  [[R.r]] P, check that X  [[L.l]]  here (one of the) S is computed “for free” MONITORING Let P  P1 ...  Pn IF  no credential for S is removed  no credential for G is added Then  OK Otherwise  Check Q again, and  Recompute G and S (even if Q still holds) To monitor this we need the cooperation of other principals

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 17 Conclusions Integrity constraints:  tool to control a TM system. Monitoring requires the cooperation of trusted principals Trust management becomes a two way process  from the trusting to the trusted  and vice-versa

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 18 Conclusions for the whole RT part Context:  2 or more parties in an open system.  parties are not in the same security domain. Goal  establish trust between parties to exchange information and services (access control) Constraint  access control decision is made NOT according to the party identity BUT according to the credentials it has

FOSAD 2006 summer schoolEtalle: Rule Based Trust Management with RT 19 Open problems Analysis  safety analysis we are now working with Spin in RT0, for RTC (with constraints) nothing is available  of negotiations protocols w.r.t. the TM goals. Integration with other systems  e.g. privacy protection location-dependent policies  ambient calculi? DRM Semantics is not correct when considering:  chain discovery  negotiations is not modular  certainly possible to improve this using previous work on omega-semantics. Types