Model-Driven Design and Administration of Access Control in Enterprise Applications April 2005.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Page 1 Copyright © 2010 Data Access Technologies, Inc. Model Driven Solutions May 2009 Cory Casanave Architecture of Services SOA for E-Government Conference.
Complete Event Log Viewing, Monitoring and Management.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Module 4: Implementing User, Group, and Computer Accounts
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Security Controls – What Works
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1 Secure Information Sharing Manager (SIS-M) Thesis 2007 Stephen D. Wise
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Peter Deutsch Director, I&IT Systems July 12, 2005
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 8: Implementing Administrative Templates and Audit Policy.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
The GPAA RFP to implement Enterprise Data Management 1 GPAA15/2015.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
ESCOP ™ System Center Operations Portal Expanding SCOM 2007 Data Warehouse and ACS Function.
Security Architecture
3 April SOA: Services Oriented Architecture MDA: Model Driven Architecture.
第十四章 J2EE 入门 Introduction What is J2EE ?
Co-design Environment for Secure Embedded Systems Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
1 Chapter Overview Introducing Replication Planning for Replication Implementing Replication Monitoring and Administering Replication.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
Dr. Darius Silingas | No Magic, Inc. Domain-Specific Profiles for Your UML Tool Building DSL Environments with MagicDraw UML.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
CS 772: Global Knowledge Networks V. “Juggy” Jagannathan CSEE, West Virginia University.
Windows Role-Based Access Control Longhorn Update
Facebook API Kelly Orser. Client Libraries Client libraries will simplify the calls to the platform by reducing the amount of code you have to write.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
WLCG-RUS An Extensible Solution to Grid Accounting & Usage Monitoring EGEE 3 rd User Forum X. Chen, A. Khan Brunel University.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Behavioral Framework Background & Terminology. Behavioral Framework: Introduction  Background..  What was the goal..
April, 2005 ebSOA Based on FERA Reference Model Vasco Drecun Collaborative Product Development Associates, LLC Goran Zugic ebXMLsoft Inc.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SharePoint Governance And the role of the Site Owner.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Chapter – 1. The UML Approach USECASE DRIVEN ARCHITECTURE CENTRIC ITERATIVE & INCREMENTAL.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Security Enhanced Administrative Role Based Access Control Models
Trend Micro Control Manager 5.0
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

Model-Driven Design and Administration of Access Control in Enterprise Applications April 2005

Proprietary and Confidential Exigen Properties, Inc. 2 Access Control in Enterprise Applications Serves as façade for external authentication, single sign on, naming and identity services, user directories Managing access control is the key requirement, role based model (RBAC) is natural choice Multiple points for permissions checks – user interface, middleware, data access Data Filtering Based on access control policy Conditional and domain-related policies are common “Only dedicated agents may access sensitive accounts”

Proprietary and Confidential Exigen Properties, Inc. 3 The Focus is The Model… Application is Modeled as a set of related UML Models Specific UML Profiles used to model different aspects of the system, including Access Control Application code is generated from set of related UML models using MDA approach Access control is checked in the points, auto- generated in the code according to Access Control Model Security Policy Administration Model drives the implementation of administration capabilities

Proprietary and Confidential Exigen Properties, Inc. 4 Model Driven Architecture Approach

Proprietary and Confidential Exigen Properties, Inc. 5 MDA is between "What?" and "How?" What is … ? Protected Resource Data Access Constraint Policy Management Model Administered Object Organizational Structure Audit Event Actionable Notification How to … ? Enforce Security Policy Filter Data Control Data Access Manage Policy Administer Users Generate Events Record and Monitor Events Generate Notifications

Proprietary and Confidential Exigen Properties, Inc. 6 “What is … ?” is Specified by Models

Proprietary and Confidential Exigen Properties, Inc. 7 “How to … ?” Is Specified by Transformations

Proprietary and Confidential Exigen Properties, Inc. 8 Access Control Transformation

Proprietary and Confidential Exigen Properties, Inc. 9 Security Policy Administration Model

Proprietary and Confidential Exigen Properties, Inc. 10 Security Administration Console

Proprietary and Confidential Exigen Properties, Inc. 11 Working Togerther at Runtime

Proprietary and Confidential Exigen Properties, Inc. 12 Where we are? Permission checks are generated in the application code Data filtering is generated, interface for filters implementation is generated Security policy applied uniformly to the application and security administration console User interface for security administration is based on the model

Proprietary and Confidential Exigen Properties, Inc. 13 Lessons Learned + Developers of vertical solutions do not implement security related code + Model provides good visibility and reduces perceivable complexity + Policy applied uniformly to multiple tiers of application - “Hello World” application is close to impossible - Code generation takes time - Generated code looks bad - hard to debug - Extra artifacts in development

Proprietary and Confidential Exigen Properties, Inc. 14 What is Next? XACML policy generation Code generation for security administration console Developing model transformations as models Defining meta-models as formal languages Formal proof of model correctness Unit tests generation