Talk Outline Motivation and Background. Policy Contexts.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

CHAPTER OBJECTIVE: NORMALIZATION THE SNOWFLAKE SCHEMA.
Architecture Representation
Database Systems: Design, Implementation, and Management Tenth Edition
OASIS Reference Model for Service Oriented Architecture 1.0
Realizing OPM Philosophy in the Context of Full Life- Cycle Support Avi Soffer Technion, Israel Institute of Technology Thesis Advisor: Prof. Dov Dori.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3 The Basic (Flat) Relational Model.
Introduction to Databases Transparencies
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Domain-Specific Software Engineering Alex Adamec.
April 27, The Role Graph Model and Tools for Design of Access Control Sylvia Osborn Dept. of Computer Science The University of Western Ontario.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
A Z Approach in Validating ORA-SS Data Models Scott Uk-Jin Lee Jing Sun Gillian Dobbie Yuan Fang Li.
An Introduction to Design Patterns. Introduction Promote reuse. Use the experiences of software developers. A shared library/lingo used by developers.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
Formal Methods in Software Engineering Credit Hours: 3+0 By: Qaisar Javaid Assistant Professor.
CSE314 Database Systems Lecture 3 The Relational Data Model and Relational Database Constraints Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Academic Year 2014 Spring Academic Year 2014 Spring.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
A Flexible Access Control Service for Java Mobile Code HPCC lab 문 정 아.
Computer Security: Principles and Practice
CSIS 4850: CS Senior Project – Spring 2009 CSIS 4850: Senior Project Spring 2009 Object-Oriented Design.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
1 Part 5. Permission Rules for Two-Level Systems Controlling access (visibility or scope) of static references. Analogous to “private” in C/C++/Java.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
LECTURE 10 Semantic Analysis. REVIEW So far, we’ve covered the following: Compilation methods: compilation vs. interpretation. The overall compilation.
Logical Database Design and the Rational Model
Access Control Model SAM-5.
UML Diagrams By Daniel Damaris Novarianto S..
Chapter 6: Integrity (and Security)
Course Outcomes of Object Oriented Modeling Design (17630,C604)
Object-Oriented Analysis and Design
Chapter 7: Entity-Relationship Model
Outline of the ER Model By S.Saha
Corky Cartwright January 18, 2017
UML Diagrams Jung Woo.
System Modeling Chapter 4
Abstract descriptions of systems whose requirements are being analysed
Validating Access Control Policies with Alloy
Business System Development
 DATAABSTRACTION  INSTANCES& SCHEMAS  DATA MODELS.
Chapter 10: Process Implementation with Executable Models
Interactions.
Quantum One.
Module 8 – Database Design Using the E-R Model
Role-Based Access Control Richard Newman (c) 2012 R. Newman
Chapter 4 Entity Relationship (ER) Modeling
Multiple Aspect Modeling of the Synchronous Language Signal
Chapter 20 Object-Oriented Analysis and Design
Finite Automata and Formal Languages
Analysis models and design models
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
XML indexing – A(k) indices
Seminar 2 Design of Informatics Systems
Chapter 5: Confidentiality Policies
Chapter 7: Entity-Relationship Model
Trees-2, Graphs Data Structures with C Chpater-6 Course code: 10CS35
Chapter 4 System Modeling.
Chapter 6b: Database Design Using the E-R Model
COMPILER CONSTRUCTION
Presentation transcript:

A Formal Model for Hierarchical Policy Contexts Opera Group Meeting, May 11th, 2004

Talk Outline Motivation and Background. Policy Contexts. Role-Based Access Control. RBAC Policy Representation. Difficulties in large-scale policy administration. Policy Contexts. Where we were last year. Overview of our hierachical context formal model. Managing information flow. OASIS RBAC policy components. Access control to policies themselves. Future Work. Conclusion.

Background Role-Based Access Control Large-scale policy administration Simplifies security management by introducing the role abstraction between principals and privileges. Access control policy is authored via: some static relations (simple). rules which involve policy inferencing (more complex). Large-scale policy administration Real deployments of RBAC require large numbers of roles. Role parameterisation can reduce explosive growth. A student role parameterised by their ID, for example. Not possible to perform centralised administration: A commonly used example: UK National Health Service.

Policy Contexts Policy Contexts were introduced last year at Policy. Provide a labelling mechanism for RBAC components. Operates in parallel with RBAC rule semantics. Focuses on policy administration not system operation. Our work used OASIS RBAC as its basis. Open Architecture for Secure Interworking Services. Rules, roles, and parameters are the main policy elements. Contexts introduces Mandatory Access Control properties: In particular information flow constraints. We discussed how labelling also helps policy administration. Extending our initial work: We provide a formal model. Define hierarchical context management.

Parallel context classification Consider a parallel information flow example: The left models the human hierarchy of an organisation. The right models an aspect of implementation. We wish to enforce both sets of constraints simultaneously. We need some formal semantics to make sense of this.

Non-hierarchical Contexts A non-hierarchical context is a finite set of labels. Each label is a context element (CE). We define an information flow relation: A A B i.e. flow is permitted from context element A to element B. Wildcard support is desirable for future-proofing: Allow future rules to be included under existing restrictions. Wildcards require scoping to avoid security problems. We need to support parallel information flow specifications. Grouping labels which themselves represent contexts provides a solution to the scoping problem. Hence our introduction of hierarchical contexts.

Hierarchical Contexts (2) Allow administration on numerous levels. Contexts on at a given level become context-elements in the next level down the hierarchy.

Hierarchical Contexts (3) Let C be the set of all hierarchical context elements. First we define the parent relationship: XC, context element X has at most one direct parent P. We define Cparent as the relation: (P,X)  Cparent We further require that CEs cannot be their own parent. Thus (C,Cparent) forms a forest of rooted trees. The Croot predicate evaluates ‘true’ for root CEs. We require that labels are unique among siblings This means that root CE labels must also be unique. We introduce a path notation on CE labels: For example: CompLab.OPERA.Middleware

Hierarchical Contexts (4) Wildcards are defined using parameterised symbols. For example subtree(X) indicates an information source or target for X and the entire sub-tree of which it is the root. All parameterised symbols are belong to the set CE At enforcement time, expand is the function used to generate all CE members from C given an element from CE We also maintain E to mean all context elements. Information flows are specified via two functions: context_out : C  P(C  CE  {E}) context_in : C  P(C  CE  {E,e}) Here P represents a power-set. Also e indicates an initial context element. Initial CEs imply no information flow checks are done.

Information flow The information flow graph will contain an edge between two context elements if both elements’ in and out restrictions are satisfied. We need Ceval to generate a set of elements from expressions, e.g. with respect to our earlier figure: Ceval({CompLab.Security, subtree(CompLab.OPERA)}) = {CompLab.Security, CompLab.OPERA, CompLab.OPERA.general, CompLab.OPERA.Trust, CompLab.OPERA.Policy, CompLab.OPERA.Middleware} So we can define the relation: A A B  (A=B)  (BCeval(context_out(A))  ACeval(context_in(B))) Also define A* as the transitive closure of direct edges.

Information flow in practice For information to flow between a parent and a child both the child’s in and the parent’s out information flow restrictions must be considered (or vice versa). Either explicit context element definitions are used, or appropriate wild-card expressions can be employed. Wild-cards are intended to assist future-proofing through use of abstractions instead of explicit labels. Another consideration is that context elements in an information-flow cycle end up being equivalent. This could lead to unintuitive results. Such context elements may still be usefully kept separate for non-information flow context purposes however.

Policy management Note that policy components are associated with contexts rather than context elements. i.e. components may have multiple context element labels. This increases the expressive power of context constraints. We can encode multiple parallel constraint dimensions. Information flow between contexts: A  P(C)  P(C) Consider: a A b Each context element in a must reach (via A*) one in b. Almost the same applies for context elements in b all being reached (again via A*) by those in a except: B in b might be initial (i.e. have e  context_in(B)). Details are in the paper (see Definition 3.1)

OASIS policy rules OASIS has a particular structure for its policy rules: Privilege Authorisation: r, e1, … , ene H p Role Activation: r1, … , rnr, ac1, … , acnac, e1, … , ene H r All components may be annotated with contexts. Also any rule component may have subcomponents which are classified into contexts: rule_comp[contextcomp](param1[context1],paramn[contextn]) Parameterised attributes need context labelling when being handled by certain predicates. They may have different sensitivities. For example a patient identifier versus a simple date field. External predicates facilitate information flow in and out of the access control software.

Managing access control to policies Through labelling, contexts provide a means to view and categorise the policy rules themselves. Encode structural groups. Even without information flow this may help identify individual ward rules within a hospital policy. Note that sub-components of a policy component must belong to the context of their parent however: This simplifies administration and increases safety - this localises the effects of the context in and out functions, whilst not precluding expressive context flow mappings. Provide a target for administrative privileges. Visibility of policy rules to different principals. Organisational versus functional roles. Contexts can indicate role properties to policy designers.

Future work Using contexts to manage audit granularity. Certain contexts may indicate greater logging interest. Classify remote credential sensitivity. Certain credentials may need faster revocation checks. Context support for dynamic constraints. Grouping for cardinality constraints. Dynamic separation of duties is an example. Integration into other RBAC systems. NIST RBAC schemes are simpler than OASIS Need to consider interactions with role-hierachies however. Ponder hierarchical management domains similar Introduce explicit information flow restrictions.

Conclusion We have introduced hierarchical policy contexts to facilitate enforcement of information flow constraints during policy specification. Extended our earlier work with a formal model. We applied our context research to the OASIS RBAC system, but it is intended to generalise cleanly. We also discussed other useful context functions: Management of access control to the policies themselves. Contexts add another level to policy authoring. We feel the benefits in large-scale policy systems will outweigh this extra complexity. Any questions?