Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security Research: A Personal Perspective

Similar presentations


Presentation on theme: "Cyber Security Research: A Personal Perspective"— Presentation transcript:

1 Cyber Security Research: A Personal Perspective
Prof. Ravi Sandhu Executive Director and Endowed Chair Department of Computer Science University of Texas at San Antonio CS 7123 Research Methods Nov 9, 2016 © Ravi Sandhu World-Leading Research with Real-World Impact!

2 Prognosis This is an exciting time for cyber security researchers
Cyberspace will become orders of magnitude more complex and confused very quickly Cyber and physical distinction will disappear Threats will go beyond money to physical harm Overall this is a very positive development and will enrich human society It will be messy but need not be chaotic! Cyber security research/practice are loosing ground This is an exciting time for cyber security researchers UTSA offers exciting research opportunities © Ravi Sandhu World-Leading Research with Real-World Impact! 2

3 Security Objectives INTEGRITY modification AVAILABILITY access
CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 3

4 Security Objectives USAGE purpose INTEGRITY modification AVAILABILITY
access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 4

5 Security Objectives USAGE purpose USAGE INTEGRITY modification
AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 5

6 Cyber Security Research
Application Domain 1 Application Domain n Cyber Security Foundations © Ravi Sandhu World-Leading Research with Real-World Impact!

7 Access Control Research
Cloud Computing Social Computing Internet of Things Big Data Authentication versus Authorization Access Control Role-Based Attribute-Based Relationship-Based Provenance-Based © Ravi Sandhu World-Leading Research with Real-World Impact!

8 Access Control Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 8

9 Access Control Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970 Owner of a resource can grant access to anyone Anyone: too dangerous Copy versus read Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 9

10 Access Control Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970 Enforce one-directional information flow Covert channels Inference Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 10

11 Access Control Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Manage permissions based on roles and constraints Role design Role explosion Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 11

12 Access Control Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Unify, mitigate shortcomings and include contextual and mutable attributes Policy design Policy comprehension Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 12

13 Ultimate Unified Model
Attributes Security Access Control Trust Risk Relationships Provenance © Ravi Sandhu World-Leading Research with Real-World Impact!

14 Access Control Research
Cloud Computing Social Computing Internet of Things Big Data Access Control Role-Based Attribute-Based Relationship-Based Provenance-Based © Ravi Sandhu World-Leading Research with Real-World Impact!


Download ppt "Cyber Security Research: A Personal Perspective"

Similar presentations


Ads by Google