Executive Director and Endowed Chair

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Access Control Prof. Ravi Sandhu Executive Director and Endowed Chair
George Mason University
ACCESS-CONTROL MODELS
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Lecture 8 Access Control (cont)
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
Database Security - Farkas 1 Database Security and Privacy.
Attribute-Based Access Control Models and Beyond
Access Control Intro, DAC and MAC System Security.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Li Xiong CS573 Data Privacy and Security Access Control.
CS426Fall 2010/Lecture 191 Computer Security CS 426 Lecture 19 Discretionary Access Control.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
IS 302: Information Security and Trust Week 10: Access Control 2012.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Li Xiong CS573 Data Privacy and Security Access Control.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Role-Based Access Control (RBAC)
Institute for Cyber Security
Mandatory Access Control (MAC)
Past, Present and Future
An Access Control Perspective on the Science of Security
Discretionary Access Control (DAC)
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Challenge-Response Authentication
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Mandatory Access Control (MAC)
Institute for Cyber Security
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Information Security CS 526 Topic 16
Security and Privacy in the Age of the Internet of Things:
OM-AM and RBAC Ravi Sandhu*
Authentication and Authorization Federation
OS Access Control Mauricio Sifontes.
Attribute-Based Access Control: Insights and Challenges
Information Security CS 526 Topic 16
Identity and Access Control in the
Executive Director and Endowed Chair
Challenge-Response Authentication
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

Executive Director and Endowed Chair CS 6393 Lecture 2 DAC and MAC Prof. Ravi Sandhu Executive Director and Endowed Chair January 22, 2016 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Access Control Models Discretionary Access Control (DAC) Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Same as Lattice-Based Access Control (LBAC) Access based on security labels Labels propagate to copies Role-Based Access Control (RBAC) Access based on roles Can be configured to do DAC or MAC What’s next? Attribute-Based Access Control (ABAC) Relationship-Based Access Control (ReBAC) Usage Control (UCON) Numerous other models but only 3 successes © Ravi Sandhu 2

PEI Models Idealized Enforceable (Approximate) Codeable © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Access Control Fixed policy Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Flexible policy © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Access Control Enterprise Oriented Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Beyond Enterprise © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Access Control Administration Driven Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC), ???? Automated Adaptive © Ravi Sandhu World-Leading Research with Real-World Impact! 7

DAC: ACCESS MATRIX MODEL P model Objects (and Subjects) F G r w own S u b j e c t s U r r w own V rights © Ravi Sandhu World-Leading Research with Real-World Impact! 8

ACCESS CONTROL LISTS (ACLs) E model F U:r U:w U:own G U:r V:r V:w V:own each column of the access matrix is stored with the object corresponding to that column © Ravi Sandhu World-Leading Research with Real-World Impact! 9

CAPABILITY LISTS E model U F/r, F/w, F/own, G/r V G/r, G/w, G/own each row of the access matrix is stored with the subject corresponding to that row © Ravi Sandhu World-Leading Research with Real-World Impact! 10

commonly used in relational database management systems ACCESS CONTROL TRIPLES Subject Access Object U r F U w F U own F U r G V r G V w G V own G E model commonly used in relational database management systems © Ravi Sandhu World-Leading Research with Real-World Impact! 11

DAC: TROJAN HORSE VULNERABILITY ACL File F A:r A:w File G B:r A:w B cannot read file F © Ravi Sandhu World-Leading Research with Real-World Impact! 12

B can read contents of file F copied to file G DAC: TROJAN HORSE VULNERABILITY A ACL executes File F A:r A:w read Program Goodies Trojan Horse File G B:r A:w write B can read contents of file F copied to file G © Ravi Sandhu World-Leading Research with Real-World Impact! 13

Owner unrestricted DAC versus restricted DAC Safety in restricted DAC DAC CHALLENGES Owner unrestricted DAC versus restricted DAC Safety in restricted DAC Undecidable NP-Hard, PSpace-Hard Transfer of ownership Multiple ownership Cascading grants and revokes Negative authorizations and conflict resolution Worse with groups and hierarchies DAC policy limits You can give only what you have How about user administration? Practical DAC deployments Ownership consolidated in a single administrator Can lead to inadvertent cascading revokes © Ravi Sandhu 14

LBAC: LATTICE STRUCTURES P model Top Secret Secret Confidential Unclassified dominance  can-flow © Ravi Sandhu World-Leading Research with Real-World Impact! 15

LBAC: LATTICE STRUCTURES P model TS, {A,B} Hierarchical Classes with Compartments TS, {A} TS, {B} TS, {} S, {A,B} S, {A} S, {B} S, {} © Ravi Sandhu World-Leading Research with Real-World Impact! 16

LBAC: LATTICE STRUCTURES SIMPLE-SECURITY Subject S can read object O only if label(S) dominates label(O) STAR-PROPERTY (LIBERAL) Subject S can write object O only if label(O) dominates label(S) STAR-PROPERTY (STRICT) label(O) equals label(S) © Ravi Sandhu World-Leading Research with Real-World Impact! 17

EQUIVALENCE OF BLP AND BIBA P model HI (High Integrity) LI (Low Integrity)  LI (Low Integrity) HI (High Integrity) BIBA LATTICE EQUIVALENT BLP LATTICE Information flow downwards Information flow upwards © Ravi Sandhu World-Leading Research with Real-World Impact! 18

EQUIVALENCE OF BLP AND BIBA P model HS (High Secrecy) LS (Low Secrecy)  LS (Low Secrecy) HS (High Secrecy) BLP LATTICE EQUIVALENT BIBA LATTICE Information flow downwards Information flow upwards © Ravi Sandhu World-Leading Research with Real-World Impact! 19

EQUIVALENT BLP LATTICE COMBINATION OF DISTINCT LATTICES P model HS LI HS, LI  HS, HI LS, LI LS HI LS, HI BLP BIBA GIVEN EQUIVALENT BLP LATTICE Information flow upwards Information flow upwards © Ravi Sandhu World-Leading Research with Real-World Impact! 20

LBAC: LATTICE STRUCTURES High Trojan Horse Infected Subject High User Information is leaked unknown to the high user COVERT CHANNEL Low Trojan Horse Infected Subject Low User © Ravi Sandhu World-Leading Research with Real-World Impact! 21

Discuss figures from LBAC93 paper © Ravi Sandhu World-Leading Research with Real-World Impact!