1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
Institute for Cyber Security
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT June 21, 2012
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Role-Based Access Control (RBAC)
Institute for Cyber Security
Past, Present and Future
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Introduction to Cyber Security
Introduction and Basic Concepts
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
The Future of Access Control: Attributes, Automation and Adaptation
On the Value of Access Control Models
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Authentication and Authorization Federation
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

2 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Messy or Chaotic? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

 Cyberspace will become orders of magnitude more complex and confused very quickly  Overall this is a very positive development and will enrich human society  It will be messy but need not be chaotic! © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Prognosis: Cyberspace

© Ravi Sandhu 4 World-Leading Research with Real-World Impact! Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ????

© Ravi Sandhu 5 World-Leading Research with Real-World Impact! Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Fixed policy Flexible policy

© Ravi Sandhu 6 World-Leading Research with Real-World Impact! Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Human Driven Automated Adaptive

© Ravi Sandhu 7 World-Leading Research with Real-World Impact! Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Messy or Chaotic?

Cyber Security Technologies © Ravi Sandhu 8 World-Leading Research with Real-World Impact! AUTHENTICATION INTRUSION DETECTION AND AUDIT CRYPTOGRAPHY ACCESS CONTROL ASSURANCE RISK ANALYSIS SECURITY ENGINEERING & MANAGEMENT

 Analog Hole  Inference  Covert Channels  Side Channels  Phishing  Safety  Usability  Privacy  Attack Asymmetry  Compatibility  Federation  …. © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Access Control Limitations

 Analog Hole  Inference  Covert Channels  Side Channels  Phishing  Safety  Usability  Privacy  Attack Asymmetry  Compatibility  Federation  …. © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Access Control Limitations Can manage Cannot eliminate

 Discretionary Access Control (DAC), 1970  Owner controls access  But only to the original, not to copies  Grounded in pre-computer policies of researchers  Mandatory Access Control (MAC), 1970  Synonymous to Lattice-Based Access Control (LBAC)  Access based on security labels  Labels propagate to copies  Grounded in pre-computer military and national security policies  Role-Based Access Control (RBAC), 1995  Access based on roles  Can be configured to do DAC or MAC  Grounded in pre-computer enterprise policies © Ravi Sandhu 11 World-Leading Research with Real-World Impact! Access Control Models Numerous other models but only 3 successes: SO FAR

© Ravi Sandhu 12 World-Leading Research with Real-World Impact! The RBAC Story RBAC96 model NIST-ANSI Standard Proposed NIST-ANSI Standard Adopted

13 World-Leading Research with Real-World Impact! RBAC96 Model © Ravi Sandhu Constraints

Fundamental Theorem of RBAC © Ravi Sandhu 14 World-Leading Research with Real-World Impact!  RBAC can be configured to do MAC  RBAC can be configured to do DAC  RBAC is policy neutral RBAC is neither MAC nor DAC!

 Role granularity is not adequate leading to role explosion  Researchers have suggested several extensions such as parameterized privileges, role templates, parameterized roles (1997-)  Role design and engineering is difficult and expensive  Substantial research on role engineering top down or bottom up (1996-), and on role mining (2003-)  Assignment of users/permissions to roles is cumbersome  Researchers have investigated decentralized administration (1997-), attribute-based implicit user-role assignment (2002-), role-delegation (2000-), role-based trust management (2003-), attribute-based implicit permission-role assignment (2012-)  Adjustment based on local/global situational factors is difficult  Temporal (2001-) and spatial (2005-) extensions to RBAC proposed  RBAC does not offer an extension framework  Every shortcoming seems to need a custom extension  Can ABAC unify these extensions in a common open-ended framework? © Ravi Sandhu 15 World-Leading Research with Real-World Impact! RBAC Shortcomings

16 World-Leading Research with Real-World Impact! RBAC Policy Configuration Points © Ravi Sandhu Constraints Security Architect Security Administrator User Security Architect Security Administrator Security Architect

17 World-Leading Research with Real-World Impact! Access Control Models © Ravi Sandhu Policy Specification Policy Reality Policy Enforcement Policy Administration

18 World-Leading Research with Real-World Impact! Access Control Models © Ravi Sandhu Policy Specification Policy Reality Policy Enforcement Policy Administration MAC, DAC focus RBAC, ABAC Initial focus

 Attributes are name:value pairs  possibly chained  values can be complex data structures  Associated with  users  subjects  objects  contexts  device, connection, location, environment, system …  Converted by policies into rights just in time  policies specified by security architects  attributes maintained by security administrators  ordinary users morph into architects and administrators  Inherently extensible © Ravi Sandhu 19 World-Leading Research with Real-World Impact! Attribute-Based Access Control (ABAC)

© Ravi Sandhu 20 World-Leading Research with Real-World Impact! ABAC Status RBAC96 paper Proposed Standard Adopted ABAC still in pre/early phase 1990? 2012

 X.509, SPKI Attribute Certificates (1999 onwards)  IETF RFCs and drafts  Tightly coupled with PKI (Public-Key Infrastructure)  XACML (2003 onwards)  OASIS standard  Narrowly focused on particular policy combination issues  Fails to accommodate the ANSI-NIST RBAC standard model  Fails to address user subject mapping  Usage Control or UCON (Park-Sandhu 2004)  Fails to address user subject mapping  Focus is on extended features  Mutable attributes  Continuous enforcement  Obligations  Conditions  Several others ……….. © Ravi Sandhu 21 World-Leading Research with Real-World Impact! ABAC Prior Work Includes

 An ABAC model requires  identification of policy configuration points (PCPs)  languages and formalisms for each PCP  A core set of PCPs can be discovered by building the ABACα model to unify DAC, MAC and RBAC  Additional ABAC models can then be developed by  increasing the sophistication of the ABACα PCPs  discovering additional PCPs driven by requirements beyond DAC, MAC and RBAC © Ravi Sandhu 22 World-Leading Research with Real-World Impact! ABACα Hypothesis (DBSEC 2012) A small but crucial step

23 World-Leading Research with Real-World Impact! ABACα Model Structure © Ravi Sandhu Policy Configuration Points

24 World-Leading Research with Real-World Impact! Authorization Policy: LAuthorization © Ravi Sandhu  DAC  MAC  RBAC0  RBAC1

25 World-Leading Research with Real-World Impact! Subject Attribute Constraints ; LConstrSub © Ravi Sandhu  MAC  RBAC0  RBAC1

26 World-Leading Research with Real-World Impact! Object Attribute Constraints © Ravi Sandhu  DAC  MAC  DAC Constraints at creation: LConstrObj Constraints at modification: LConstrObjMod

27 World-Leading Research with Real-World Impact! ABACα Model Structure © Ravi Sandhu Policy Configuration Points Future work  increasing the sophistication of the ABACα PCPs  discovering additional PCPs

28 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering

29 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models Initial Results 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering

30 World-Leading Research with Real-World Impact! ABAC Research Agenda: RBAC Inspiration © Ravi Sandhu 1. Foundational Principles and Theory Principles: RBAC96 (1996), OM-AM (2000), NIST Standard (2000, 2004), PEI (2006), ASCAA (2008) Theory: ATAM Simulation (1999), LBAC-DAC Simulations (2000), Li-Tripunitara (2006), Stoller et al (2006, 2007), Jha et al (2008) 2. Core Models: RBAC96 (1996), ANSI- NIST Standard (2000, 2004) 3. Administrative Models: ARBAC97 (1997), RBDM (2000), RDM (2000), RB-RBAC (2002), ARBAC02 (2002), PBDM (2003) ARBAC07 (2007), SARBAC (2003, 2007) 4. Extended Models: TMAC (1997) Workflow (1999), T-RBAC (2000), OrBAC (2003), TRBAC (2001), RT (2003), GTRBAC (2005), GEO- RBAC (2005), P-RBAC (2007) 5. Policy Languages Constraints: RCL (2000), Jaeger-Tidswell (2001), Crampton (2003), ROWLBAC (2008) User-role assignment: RB-RBAC (2002), RT (2003) 6. Enforcement Architectures: Ferraiolo et al (1999), OM-AM (2000), Park et al (2001), xoRBAC (2001), RCC (2003), RB-GACA (2005), XACML Profiles (2004, 2005, 2006) 7. Design and Engineering: Role engineering: Coyne (1996), Thomsen et al (1999), Epstein-Sandhu (2001), Strembeck (2005) Role mining: Kuhlmann-Schimpf (2003), RoleMiner (2006, 2007), Minimal Perturbation (2008) NOTE: Only a small sampling of the RBAC literature is cited in this diagram

Rights to attributes  Rights  Labels  Roles  Attributes © Ravi Sandhu 31 World-Leading Research with Real-World Impact! Authorization Leap Benefits  Decentralized  Dynamic  Contextual  Consolidated Risks  Complexity  Confusion  Attribute trust  Policy trust Messy Chaotic ??

 Attributes  Automated  Adaptive  Managed but not solved © Ravi Sandhu 32 World-Leading Research with Real-World Impact! Prognosis: Cybersecurity