Shriram Krishnamurthi Brown University

Slides:



Advertisements
Similar presentations
1 1 Finding the Dark Cloud: Static Analysis of Cloud Configurations Shriram Krishnamurthi Brown University.
Advertisements

News in XACML 3.0 and application to the cloud Erik Rissanen, Axiomatics
Network Security Essentials Chapter 11
CSC458 Programming Assignment II: NAT Nov 7, 2014.
1 Authorization XACML – a language for expressing policies and rules.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Margrave: XACML Verification and Change-Impact Analysis Kathi Fisler, WPI Shriram Krishnamurthi, Brown Leo Meyerovich, Brown Michael Carl Tschantz, Brown.
Putting the User in Usable Verification Kathi Fisler, WPI Joint work with Shriram Krishnamurthi.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Sybex CCNA Chapter 11: Network Address Translation Instructor & Todd Lammle.
Access Lists 1 Network traffic flow and security influence the design and management of computer networks Access lists are permit or deny statements that.
Lecture 7 Access Control
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Virtual Company Group 8 Presentation Date: June /04/2017
Intranet, Extranet, Firewall. Intranet and Extranet.
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
ECE 461 Internetworking Instructor: Prof. Jörg Liebeherr University of Toronto.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Role Based Access Control Update HL7 Working Group Meeting San Diego, CA - January 2007 Presented by: Suzanne Gonzales-Webb, CPhT VHA Office of Information.
Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
Instructor & Todd Lammle
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Computer Science Conformance Checking of Access Control Policies Specified in XACML Vincent C. Hu (National Institute of Standards and Technology) Evan.
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
ACCESS CONTROL LIST.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Faculty Center for Instructors Roles and Access Faculty Center Features Grade Changes and Approval.
SAT Applications Tutorial plus a pinch of Margrave Tim Nelson Shriram Krishnamurthi Brown University 1.
IP Addressing.
NAT/PAT by S K SATAPATHY
NETWORKING IP ADDRESSING. TYPES OF IP ADDRESS PRIVATE IP ADDRESS PUBLIC IP ADDRESS STATIC IP ADDRESS DYNAMIC IP ADDRESS.
Faculty Center for Instructors Roles and Access Faculty Center Features Grade Changes and Approval.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
Virtual Local Area Networks In Security By Mark Reed.
Planning the Addressing Structure
NPDES e-Reporting Tool - NeT Training
Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University Purdue University.
UML - The Dynamic View: Sequence and Collaboration Diagrams
PART IV Network Layer.
CS4470 Computer Networking Protocols
CGN vs PRR STATEFUL vs STATELESS.
OGSA-WG Interim F2F Meeting Security Feb. 9-10,2004
Virtual LANs.
Validating Access Control Policies with Alloy
Virtual Local Area Network
OGSA-WG Security Use Cases Jan 29, 2004
ENGL 102 Overview Goals: Understand the scope & goals of the course
* Essential Network Security Book Slides.
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
Routing and Switching Essentials v6.0
Firewalls Routers, Switches, Hubs VPNs
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
Planning the Addressing Structure
Planning the Addressing Structure
AbbottLink™ - IP Address Overview
Access Control.
Access Control What’s New?
Sybex CCNA Chapter 11: Network Address Translation.
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
TESTA-II IP Addressing
TESTA-II IP Addressing
Presentation transcript:

Shriram Krishnamurthi Brown University Policy Languages Shriram Krishnamurthi Brown University

Designated TAs can write homework grades Delegation Designated TAs can write homework grades Separation of Duty Creating a course requires authorization from two distinct people Information Filtering Professor group gets network priority Mon 12-1 Information Flow One student cannot learn another's grade information Composition Department's building access rules override the university's Administrative Nobody can change their own privileges Obligation TAs who check out assignment blocks must submit grades for them Authorization A professor can modify grades

<Policy PolicyId="SamplePolicy" RuleCombiningAlgId=”…s:names:tc:xacml:1.0:rule-combining-algorithm:permit-overrides"> <Target> <Subjects> <AnySubject/> </Subjects> <Resources> <ResourceMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <AttributeValue DataType=“…/XMLSchema#string">SampleServer</AttributeValue> <ResourceAttributeDesignator DataType=”….w3.org/2001/XMLSchema#string" AttributeId="urn:oasis:names:tc:xacml:1.0:resource:resource-id"/> </ResourceMatch> </Resources> <Actions> <AnyAction/> </Actions> </Target> …

hostname int interface in_dmz ip address 10.1.1.1 255.255.255.0 ip nat outside interface in_lan ip access-group 102 in ip address 192.168.1.1 255.255.0.0 ip nat inside access-list 102 deny ip 192.168.4.1 0.0.0.255 host 10.1.1.3 access-list 102 permit tcp any host 10.1.1.3 eq 25 access-list 102 permit tcp any any eq 80 access-list 102 deny any ip nat inside source list 1 interface in_dmz overload ip route 0.0.0.0 0.0.0.0 10.1.1.2 access-list 1 permit 192.168.1.1 0.0.255.255

Independent Composition faculty (s)  Permit(s, grades, assign) student(s)  -Permit(s, grades, assign) -faculty(s)  Permit(s, course, enroll) Safety Independent Composition Monotonicity

System Structure

System Structure = +

Access-Control Policies Policy maps requests to decisions: <subject, action, resource> g {permit, deny} Depends on the domain role not-applicable First-applicable, Permit-overrides, Deny-overrides university policy on building access department policy: undergrad TAs get night access

System Structure = +

Good Verification Target Sub-Turing-complete languages High-level operators Not very large programs Accessible to non-technical users

What Makes This Domain Hard/Interesting?

Program or Property? The balance between enforcement and verification

A professor can modify grades Delegation Authorization A professor can modify grades Delegation Designated TAs can write homework grades Information Filtering Professor group gets network priority Mon 12-1 Composition Department's building access rules override the university's Information Flow One student cannot learn another's grade information Administrative Nobody can change their own privileges Separation of Duty Creating a course requires authorization from two distinct people Obligation TAs who check out assignment blocks must submit grades for them

Linking Ontologies

A professor can modify grades Authorization A professor can modify grades Delegation Designated TAs can write homework grades Information Filtering Professor group gets network priority Mon 12-1 Composition Department's building access rules override the university's

Dynamics

Dynamic/Temporal Policies Coarse-grained: Fine-grained: Don’t allow access to a paper’s other reviews until the PC member has submitted their own review Submit Review Meet Respond

Mutual Dependence

func UploadReview(a, p) { if Permit == CheckReq (a,submit-review,p) Reviews := Review U (a, p) …} During submission phase, author may submit a paper During review phase, a reviewer r may submit review for paper p if r is assigned to p ….

What is the State Space?

⊨ Access Control ⊨ Business Rules ⊨ ⊨ ⊨