Outline Motivation Access Control Matrix Model

Slides:



Advertisements
Similar presentations
© 2004 Ravi Sandhu The Safety Problem in Access Control HRU Model Ravi Sandhu Laboratory for Information Security Technology George Mason.
Advertisements

© Ravi Sandhu HRU and TAM Ravi Sandhu Laboratory for Information Security Technology George Mason University
Access Control CS461/ECE422 Fall Reading Material Chapter 4 through section 4.5 Chapters 23 and 24 – For the access control aspects of Unix and.
1 1 -Access Control Foundational Results. 2 2 Preliminaries Undecidability The Halting Problem The Turing Machine.
Access Control Discretionary Access Control Lecture 4 1.
1 Access Control Matrix CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 9, 2004.
Authentication James Walden Northern Kentucky University.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
April 6, 2004ECS 235Slide #1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe Defaults –Economy of Mechanism –Complete Mediation.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result –Corollaries.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
590J Lecture 21: Access Control (contd). Review ● Recall: – Protection system is a description of conditions under which a system is secure – P is the.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
1 Access Control Matrix CSSE 442 Computer Security Larry Merkle, Rose-Hulman Institute March 16, 2007.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
LESSON 17 PREPARED BY MANJU. database A database is a collection of related information Access is the Microsoft Office database program that enables you.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
Csci5233 computer security & integrity 1 Access Control Matrix.
IS-2150/TEL-2810: Introduction of Computer Security1 September 7, 2005 Introduction to Computer Security Access Control Matrix Take-grant model.
ECE509 Cyber Security : Concept, Theory, and Practice Access Control Matrix Spring 2014.
Chapter 2: Access Control Matrix
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
ISA Access Control ISA 562 Internet Security Theory & Practice.
D ISCRETIONARY A CCESS C ONTROLS Truong Quynh Chi Faculty of Computer Science & Engineering HCMC University of Technology
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Access Control.
Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection State Transitions –Commands –Conditional Commands.
Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result –Corollaries.
Slide #2-1 Access Control Matrix and Safety Results CS461/ECE422 Computer Security I, Fall 2009 Based on slides provided by Matt Bishop for use with Computer.
Access Control in Practice CS461/ECE422 Fall 2010.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Design Principles and Common Security Related Programming Problems
1/30/20161 Computer Security Access Control Matrix.
2/1/20161 Computer Security Foundational Results.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 4 September 18, 2012 Access Control Model Foundational Results.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
April 8, 2004ECS 235Slide #1 Overview Safety Question HRU Model Take-Grant Protection Model SPM, ESPM –Multiparent joint creation Expressive power Typed.
November 1, 2004Introduction to Computer Security © 2004 Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection.
September 10, 2012Introduction to Computer Security © 2004 Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model.
Access Control Discretionary Access Control Chapter 3.
CSC 482/582: Computer Security
IS 2150 / TEL 2810 Introduction to Security
Institute for Cyber Security
A brief summary of database normalization
IS 2150 / TEL 2810 Introduction to Security
Introduction to Computer Security Lecture 2
September 16, 2004 Introduction to Computer Security Lecture 3
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
General OS Security: Memory Protection and Access Control
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 13: Design Principles
Computer Security Access Control Matrix
IS 2150 / TEL 2810 Introduction to Security
مدلهاي کنترل دسترسي اختياري
Graph Coverage for Specifications CS 4501 / 6501 Software Testing
Overview Safety Question HRU Model Take-Grant Protection Model
Computer Security Foundations
Computer Security: Art and Science, 2nd Edition
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 2: Access Control Matrix
IS 2150 / TEL 2810 Introduction to Security
Review of Week 3 Relation Transforming ERD into Relations
Chapter 4: Security Policies
Computer Security Access Control Mechanisms
IS 2150 / TEL 2810 Introduction to Security
IS 2150 / TEL 2810 Introduction to Security
Chapter 2: Access Control Matrix
Presentation transcript:

Outline Motivation Access Control Matrix Model Protection State Transitions HRU Model Commands Conditional Commands Basic Safety results

Definitions Protection state of system Access control matrix Describes current settings, values of system relevant to protection Access control matrix Describes protection state precisely Matrix describing rights of subjects State transitions change elements of matrix

Description objects (entities) Subjects S = { s1,…,sn } Objects O = { o1,…,om } Rights R = { r1,…,rk } Entries A[si, oj] R A[si, oj] = { rx, …, ry } means subject si has rights rx, …, ry over object oj objects (entities) subjects s1 s2 … sn o1 … om s1 … sn

Example 1 Processes p, q Files f, g Rights r, w, x, a, o

Example 2 Procedures inc_ctr, dec_ctr, manage Variable counter Rights +, –, call counter inc_ctr dec_ctr manage inc_ctr + dec_ctr – manage call call call

Boolean Expression Evaluation ACM controls access to database fields Subjects have attributes Verbs define type of access Rules associated with objects, verb pair Subject attempts to access object Rule for object, verb evaluated, grants or denies access

Example Subject annie Verb paint Object picture Attributes role (artist), groups (creative) Verb paint Default 0 (deny unless explicitly granted) Object picture Rule: paint: ‘artist’ in subject.role and ‘creative’ in subject.groups and time.hour ≥ 0 and time.hour < 5

ACM at 3AM and 10AM At 3AM, time condition met; ACM is: not met; ACM is: … picture … … picture … … annie … paint … annie …

History Database: Queries: 1.sum(salary, “position=teacher”) = 140,000 2.count(“age < 40 & position = teacher”) = 1 3.sum(salary, “age >= 40 & position = teacher”) should not answer this. Overlap = 2

State Transitions Change the protection state of system |– represents transition Xi |–  Xi+1: command  moves system from state Xi to Xi+1 Xi |– * Xi+1: a sequence of commands moves system from state Xi to Xi+1 Commands often called transformation procedures

Example Transitions

Example Composite Transition

HRU Model Harrison, Ruzzo, and Ullman proved key safety results in 1976 Talked about systems With initial protection state expressed in ACM State transition commands built from a set of primitive operations Applied conditionally.

Creating File Process p creates file f with r and w permission command create•file(p, f) create object f; enter own into A[p, f]; enter r into A[p, f]; enter w into A[p, f]; end

Confer Right Example of a mono-conditional command Also, mono-operational command command confer_r(owner, friend,f) if own in A[owner, f] then enter r into A[friend,f] end

Remove Right Example using multiple conditions command remove_r(owner,exfriend, f) if own in A[owner, f] and r in A[exfriend, f] then delete r from A[exfriend, f] end

Copy Right Allows possessor to give rights to another Often attached to a right, so only applies to that right r is read right that cannot be copied rc is read right that can be copied Is copy flag copied when giving r rights? Depends on model, instantiation of model

Attenuation of Privilege Principle says you can’t give rights you do not possess Restricts addition of rights within a system Usually ignored for owner Why? Owner gives herself rights, gives them to others, deletes her rights.

The Safety Problem Given initial state protection scheme (HRU commands) Can r appear in a cell that exists in the initial state and does not contain r in the initial state? More specific question might be: can r appear in a specific cell A[s,o] Safety with respect to r

Safety of a Specific Access Control System Is it decidable? Is it computationally feasible? Safety is undecidable in the general HRU model Maps to the Halting problem

Safety Results Constraints on HRU help some Safety for mono-operational systems is decidable but NP-Complete Mono-conditional monotonic HRU is decidable but not interesting Other systems proposed with better results Take-Grant model – decidable in linear time Still an active research area Comparing expressiveness with safety

Key Points Access control matrix simplest abstraction mechanism for representing protection state Transitions alter protection state 6 primitive operations alter matrix Transitions can be expressed as commands composed of these operations and, possibly, conditions Early safety proofs build on this HRU model