EIS Theme 8: Trust and Security Second Workshop Usability and Interoperability in AuthN/AuthZ Angela Sasse Philip Inglesant.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Virtual University - Human Computer Interaction 1 © Imran Hussain | UMT Imran Hussain University of Management and Technology (UMT) Lecture 16 HCI PROCESS.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
Access Control Intro, DAC and MAC System Security.
CS540 Software Design Lecture 1 1 Lecture 1: Introduction to Software Design Anita S. Malik Adapted from Budgen (2003) Chapters 1.
Towards a Generic Platform for Developing CSCL Applications Using Grid Infrastructure by Santi Caballé Open University of Catalonia Barcelona, Spain with.
Basic guidelines for the creation of a DW Create corporate sponsors and plan thoroughly Determine a scalable architectural framework for the DW Identify.
Monitoring and performance measurement in Production Grid Environments David Wallom.
OASIS Reference Model for Service Oriented Architecture 1.0
Lecture 5 Themes in this session Building and managing the data warehouse Data extraction and transformation Technical issues.
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Security Issues in Physics Grid Computing Ian Stokes-Rees OeSC Security Working Group 14 June 2005.
CAP 252 Lecture Topic: Requirement Analysis Class Exercise: Use Cases.
Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
DataGrid Kimmo Soikkeli Ilkka Sormunen. What is DataGrid? DataGrid is a project that aims to enable access to geographically distributed computing power.
© Lethbridge/Laganière 2001 Chapter 7: Focusing on Users and Their Tasks1 7.1 User Centred Design (UCD) Software development should focus on the needs.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Tryggve project developing services for sensitive biomedical data: Call for Nordic use cases NeiC 2015 Conference Workshop on sensitive data Antti Pursula.
Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
Chapter 1 Introduction to Databases
Catania Science Gateway Framework Motivations, architecture, features Catania, 09/06/2014Riccardo Rotondo
Domain Modelling the upper levels of the eframework Yvonne Howard Hilary Dexter David Millard Learning Societies LabDistributed Learning, University of.
Chapter 1 Overview of Databases and Transaction Processing.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Universität Stuttgart Universitätsbibliothek Information Retrieval on the Grid? Results and suggestions from Project GRACE Werner Stephan Stuttgart University.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
Chapter 7: WORKING WITH GROUPS
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
University of Sunderland COMM80 Risk Assessment of Systems ChangeUnit 13 Overview of Riskit*: The Method and its Techniques * Further information available.
Databases and Database Management Systems
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
API, Interoperability, etc.  Geoffrey Fox  Kathy Benninger  Zongming Fei  Cas De’Angelo  Orran Krieger*
The Brain Project – Building Research Background Part of JISC Virtual Research Environments (Phase 3) Programme Based at Coventry University with Leeds.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Component 4: Introduction to Information and Computer Science Unit 9/Part a: Components and Development of Large Scale Systems.
Jane Hill Directory Services Product Manager, Harvard University.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
NeuroLOG ANR-06-TLOG-024 Software technologies for integration of process and data in medical imaging A transitional.
SWE 513: Software Engineering
1 e-Arts and Humanities Scoping an e-Science Agenda Sheila Anderson Arts and Humanities Data Service Arts and Humanities e-Science Support Centre King’s.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Oct 211 The next two weeks Oct 21 & 23: Lectures on user interface evaluation Oct 28: Lecture by Dr. Maurice Masliah No office hours (out of town) Oct.
Chapter 1 Overview of Databases and Transaction Processing.
InSilicoLab – Grid Environment for Supporting Numerical Experiments in Chemistry Joanna Kocot, Daniel Harężlak, Klemens Noga, Mariusz Sterzel, Tomasz Szepieniec.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
© 2008 Open Grid Forum PGI - Information Security in the UNICORE Grid Middleware Morris Riedel (FZJ – Jülich Supercomputing Centre & DEISA) PGI Co-Chair.
Information Systems Development
Information Systems Development
CASE Tools and Joint and Rapid Application Development
By Dr. Abdulrahman H. Altalhi
COIT20235 Business Process Modelling
Software Defined Networking (SDN)
Creating an eResearch environment – Lessons learned
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

eIS Theme 8: Trust and Security Second Workshop Usability and Interoperability in AuthN/AuthZ Angela Sasse Philip Inglesant

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Easy Expression of Authorisation Policies Usability of AuthZ Policy-based access control and specification of policies Joint project with David Chadwick and Kent Reduce scope for misconceptions and mistakes Input and output in controlled natural language Overcoming existing problems Avoiding need for knowledge of RBAC structure The overall aim of the project is to support e-Science resource owners who are not security experts to create authorisation policies for their e-science applications.

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Usability & security in the specification of access control policies Phase 1: Qualitative interviews Expressions of security terms Issues in Grid security Phase 2: Meeting usability needs in policy specification Extend GUI with controlled natural language Evaluation of beta-level implementation Analysis – does it overcome problems? Are there new issues? What and why?

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Phase 1: Qualitative interviews: what are the usability needs? What are Grid users’ security needs and how do they express them? Individual and focus groups 45 participants Researchers using Grid in: PP, chemistry, medical, modelling, Arts & Humanities etc. System administrators eg. Central IS Service providers, developers & Grid pioneers

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Findings: Issues in Grid access control Grid used by many different research areas Many different reasons to use Grid Many different security requirements Real-world situations are complex and changeable Example: field-level access to db; research groups of a university But need for accurate specification of Grid access control Examples: Medical research; commercially valuable data Even if there are “no” security needs - data integrity

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Why are people using Grid? Access to large volumes of data, large amounts of data storage, or safe long-term storage of data Sharing data with the research community, such as repositories of metadata or images, and accessing specialised data High-Powered Computing needs, typically provided by multi-workstation systems, within one domain/across administrative domains Specialised applications such as computer modelling or visualisation, often within a Virtual Research Environment

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Different security level needs and why High needs – must be certain of security Medical research Commercially sensitive or valuable data Privacy – access subject to approval or for a certain use Conversely - need to enable access to those who should have it Funder might require findings to be made public Sharing data across a research group Need to make particular resources available Subject to some constraints, eg. time budget, overnight run

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Other access concerns Data at different levels of granularity Database fields Constraints: time, where a person is from, title Anonymised/pseudonymised data But may be vulnerable to access to different datasets Many different kinds of accesses “Grid resources” – filestore, data, HPC Run a particular program (eg. proprietary software) Access only to full members of the campus grid Maintenance problem – as groups join/leave the grid

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Implications for Usable AuthZ Hard to control Traditional – Unix-style, allocating users to groups - is this scalable? May be enough if staff turnover is small and access control is basic Different kinds of access resemble Web 2.0 To be honest, if I had to set security policies for all the users, I'd be really annoyed, I'd probably just have two level authentication, that said "I'm the administrator, I can do what I want", "everyone else is a lowly user, and all they can do is submit jobs and see their own jobs” Policy-based access control How much is it being used?

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Usability of access control models Access control models are beyond resource owners’ experience Resources owners know the resources under their control but.... struggle to express it in formal terms R-what? – policy components Earlier research found some common misconceptions Deny all except, delegated SoA, “subject domain” Partially overcome with GUI Editor

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Personae of resource owners Grid pioneers Developers Service providers And as such are also sysadmins … System administrators Grid may be peripheral to what they do Clusters & head nodes may have traditional Unix control E-Science users May be new users of Grid May have had admin responsibilities given to them

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Phase 2: Meeting usability needs in policy specification PERMIS authorisation infrastructure PERMIS Policy Editor GUI designed to reduce burden of expression And guide users to specify complete policies Overcomes some basic misconceptions using Conceptual Design and other HCI methods The structure of the policy space Deny all except

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ The PERMIS Controlled Natural Language interface A more fundamental way to reduce scope for misconceptions And mistakes - slips Natural language output as well as input The virtuous circle of policy specification Based on GATE natural language processing Ontology as intermediary between NLP and policy

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Does natural language fix the problems? Evaluation: 17 participants 1 basic scenario and 1 more advanced Usability of controlled natural language Basic idea is easy to grasp Simple scenario took mean 4.47 attempts/24:27 minutes Participants understand building blocks – resources, actions, permissions, roles

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Overcoming conceptual problems Only give permissions – no tendency to “exclude” “Subject domain” is intuitive - once users work out how to express it But – delegated role assignment is less intuitive “administrator” is a special role with special “assign” privileges Some people assigned “roles” to all users or expressed as “adding” users to roles Suggests they have not understood

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Problems in controlled natural language Linguistic cueing Some basic usability problems in controlled natural language, eg. use of prepositions – “Clerk can read on database” Need to pre-specify entities – a feature Clerk can read databsae Problems specifying resources level of resources – what does the policy apply to? or how to specify them

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Name and DoB and address and postcode and record are resources. Clerk can write to name, to DoB, to address to postcode and to record. Owner reads all from record. Participant: Do I need to even specify that a record exists, or can I specify, you know? Database is a type of resource. Ourdb is a database. Participant: I've said "database" is a resource - should I make the elements resources, rather than the database? Examples of specifying resources

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Understanding the problems Are the controlled natural language problems basic usability problems? No. The computer needs unambiguous input but the natural language is in the users’ real world

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Abstract & Concrete thinking Users understand “building blocks” in concrete terms Resources, roles, actions, etc are just classes in the ontology Users don’t understand the ontology (and should not have to) Class/Instance problem Computers are a type of resource. Dirac is a computer. is useful but … Postcode is a type of resource. … instead of Field is a type of resource. Postcode is a field. Or – this works but does not correspond to the example: Postcode is a resource.

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Towards a new security paradigm Need to “push and prod” to overcome misconceptions Users can learn by understanding what works Immediate feedback NLP and GUI work together Disambiguation with drop-down boxes

eIS Theme 8: Trust & Security 2 nd Workshop: Usability and Interoperability in AuthN/AuthZ Ways forward Ontology at centre of policy? Access control policies – the way forward?