Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing Ram Krishnan and Ravi Sandhu University of Texas at San.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
Towards A Times-based Usage Control Model Baoxian Zhao 1, Ravi Sandhu 2, Xinwen Zhang 3, and Xiaolin Qin 4 1 George Mason University, Fairfax, VA, USA.
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Chapter 1 Overview of Databases and Transaction Processing.
CS3771 Today: deadlock detection and election algorithms  Previous class Event ordering in distributed systems Various approaches for Mutual Exclusion.
CS6133 Software Specification and Verification
Ram Krishnan PhD Candidate Dissertation Directors: Dr. Ravi Sandhu and Dr. Daniel Menascé Group-Centric Secure Information Sharing Models Dissertation.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
Overview of Databases and Transaction Processing Chapter 1.
CS603 Data Replication: Advanced March 1, Data Replication: What haven’t we Covered? Transparent replication possible –Maintain serializability,
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
Monté Carlo Simulation MGS 3100 – Chapter 9. Simulation Defined A computer-based model used to run experiments on a real system.  Typically done on a.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
Chapter 1 Overview of Databases and Transaction Processing.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
How are we computing? Invalidation Certificates Consider invalidating the constraints (prior info, and N dataset units) The invalidation certificate is.
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
1 File Systems Chapter Files 6.2 Directories 6.3 File system implementation 6.4 Example file systems.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Enforcement: Viewing/Editing Your User Profile FMCSA Portal Prioritization Phase I Release, December 2010 v1.4.
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
Anonymous Identification in Ad Hoc Groups New York, NY, USAApril 6 th, 2004 Yevgeniy Dodis, Antonio Nicolosi, Victor Shoup
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
On Reducing the Global State Graph for Verification of Distributed Computations Vijay K. Garg, Arindam Chakraborty Parallel and Distributed Systems Laboratory.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
Chapter No 4 Query optimization and Data Integrity & Security.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
Chapter 1 Overview of Databases and Transactions.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
Computer Security: Principles and Practice
Secure Composition of Untrusted Code: Wrappers and Causality Types Kyle Taylor.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Advisors: Murat Kantarcioglu, and.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
Chapter 1 Overview of Databases and Transaction Processing.
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
DISTRIBUTED FILE SYSTEM- ENHANCEMENT AND FURTHER DEVELOPMENT BY:- PALLAWI(10BIT0033)
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
Thank You to our Sponsors. Membership Reporting: Unraveling the Mystery.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Luca Pazzi, Marco Pradelli University of Modena and Reggio Emilia
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Past, Present and Future
Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
DATA MODELS.
Security Enhanced Administrative Role Based Access Control Models
Overview of Databases and Transaction Processing
Distributed Systems CS
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
PLANNING A SECURE BASELINE INSTALLATION
Assured Information Sharing
Presentation transcript:

Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing Ram Krishnan and Ravi Sandhu University of Texas at San Antonio

Problem 2 phases in access control system design How do we know 1 and 2 are consistent? – That is, that they have the same behavior wrt authorization state Policy Specification Policy Enforcement Concerned about precise conditions for authorization to hold Concerned about how to enforce the policy

Goal Investigate a methodology to show consistency Approach – Pick a specific application domain – Design a “stateless” policy specification – Develop a “stateful” enforcement specification – Show authorization equivalence

Stateless Policy Specification Focus on conditions under which authorization should hold History of actions that can lead to access – E.g. Alice can access an object if in the past she had paid membership dues up to current time Linear Temporal Logic (LTL) – Excellent fit to specify stateless policies

First-Order Linear Temporal Logic Extends familiar first-order logic with temporal operators Consider “Henceforth” and “Since” operators Join (u,g) ¬Leave (u,g) ¬Leave (u,g) S Join (u,g) s0s1s2s3s4s5 s0s1s2s3s4s5 p pppp

Application Domain Group-centric secure information sharing (g-SIS)

Group-centric Secure Information Sharing (g-SIS) GROUP Authz(U,O,R)? Join Leave Add Remove Users Objects Strict Join Strict Leave Liberal Add Liberal Remove Liberal Join Liberal Leave Strict Add Strict Remove Users Objects GROUP Authz(U,O,R)?

Group Operation Semantics Strict Vs Liberal operations – User operations (SJ, LJ, SL, LL) – Object operations (SA, LA, SR, LR) SJ (u) u not authorized to access objects added prior to join time SA (o) Users joining after add time not authorized to access o LL (u) u retains access to objects authorized at leave time LR (o) Users authorized to access o at remove time retain access

π -system g-SIS Specification: Add after Join Add before Join Well-formed traces The π-System g-SIS Specification (contd) Well-formedness constraints rule out invalid traces Examples:1. user joining and leaving in the same state 2. leaving before joining

Stateful Specification Consists of three modules state 0 state 1 phase 1 phase Capture action+authz requests (Module 1) Process action requests (Module 2) Process authz requests (Module 3) interval 0 Module 2 maintains and manages data structures  Keeps track of historical joins and leaves and adds and removes for users and objects Module 3 consults with that data structure

Mapping Stateless and Stateful state 0 state 1 SJ(u,g) SA(o,g) Authz(u,o,g) SL(u,g) ¬ Authz(u,o,g) A sample stateless trace state 0 state 1 phase 1 phase 2 phase 1 phase 2 SJReq(u,g) SAReq(o,g) isAuthz(u,o,g) 1. Process user & object events & update data structure 2. Check for authz SLReq(u,g) isAuthz(u,o,g) 1. Process user & object events & update data structure 2. Check for authz Corresponding stateful trace below α-mapping β-mapping

Authz stateful ↔ Authz stateless Lemma 3 – for every trace in stateless, an alpha-mapped action trace exists in stateful Lemma 4 – for every trace in stateful, a beta-mapped action trace exists in stateless Lemmas 3 and 4 together prove authorization equivalence

Future Work We assumed a centralized, ideal situation Distributed enforcement model (PIPs, PDPs, PEPs, etc.) – Next step towards real policy enforcement – Proving equivalence is very difficult E.g. staleness of authorization info due to network delay Stale-safe equivalence with respect to centralized specification feasible – E.g. in the presence of stale information, a user should be authorized for an action only if it was authorized using accurate information in the recent past Currently investigating for g-SIS application