Access Policy John Mitchell Stanford University. Research directions uProblem Access policy: specification and enforcement uApproach Tractable subsets.

Slides:



Advertisements
Similar presentations
The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Advertisements

Operating System Security
D u k e S y s t e m s Some tutorial slides on ABAC Jeff Chase Duke University.
Rule based Trust management using RT - second lecture Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
Trust Management I Anupam Datta Fall A: Foundations of Security and Privacy.
Trust Management II Anupam Datta Fall A: Foundations of Security and Privacy.
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Policy Languages and Enforcement John Mitchell Stanford 4 th IAPP Privacy Summit February 2004.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Understanding Active Directory
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Chapter 1 Overview of Databases and Transaction Processing.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Trust Management: Access policy and deduction John Mitchell.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
CS590U Access Control: Theory and Practice Lecture 21 (April 11) Distributed Credential Chain Discovery in Trust Management.
OASIS XACML TC and Rights Language TC Hal Lockhart
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Access Control and Policy Management Speaker: John Mitchell.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
State of e-Authentication in Higher Education August 20, 2004.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies September 7, 2010.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Grid Authorization Landscape and Futures Von Welch NCSA
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
September XACML: Consistency analysis Luigi Logrippo Université du Québec University of Ottawa
11 Restricting key use with XACML* for access control * Zack’-a-mul.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Main Theme: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
OASIS e Xtensible Access Control Markup Language (XACML) Hal Lockhart
1 Authorization Sec PAL: A Decentralized Authorization Language.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chapter 1 Overview of Databases and Transaction Processing.
Semantic Web. P2 Introduction Information management facilities not keeping pace with the capacity of our information storage. –Information Overload –haphazardly.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Decentralized Access Control: Policy Languages and Logics
Building Enterprise Applications Using Visual Studio®
Wsdl.
HL7 Security Working Group Plenary Working Group Meeting 9-14 September 2012 Baltimore, Maryland Access Control.
WEB SERVICES DAVIDE ZERBINO.
Access Control What’s New?
Presentation transcript:

Access Policy John Mitchell Stanford University

Research directions uProblem Access policy: specification and enforcement uApproach Tractable subsets of first-order logic uAccomplishments Policy languages, algorithms, demo applications uTransitions to Industry Collaboration, start-up, students to industry, industrial visitor to Stanford uContinuing efforts Interface w/commercial approaches: XrML, EPAL, P3P Policy development environment: algorithms, tools

Policy at site A may govern resources at site B Protect distributed resources with distributed policy Distributed Access Control Policy Resource Policy Resource Policy Resource ID

Decentralized Policy Example AliceEPub StateU is a university Alice is a student Grants access to university students Trusts universities to certify students Trusts ABU to certify universities StateU ABU

Policy Combination uBuild policy templates Policy 1: Generic hospital/clinic policy Policy 2: Additional decisions for this clinic uCoalitions Policy 1: Your company Policy 2: Another company that makes a business deal with you

Plan Analyze Enforce Measure Improve Policy Management Lifecycle

Policy lifecycle issues uRequirements capture What should the policy say? uDevelopment Adapt standard modules; build new ones; combine uEvaluation Does the policy say what we want? –Analysis Testing Debugging uCompliance Can the policy be enforced by info system? uMaintenance Change as needed as requirements evolve

Policy Language and Deduction uSpecification State policy succinctly and directly Confident that policy captures intention uEnforcement Deduction, proof of compliance uManage policy lifecycle Policy development tools Safety and availability analysis Core Issue

SPYCE Approach uTractable subsets of first-order logic Datalog –If-then patterns without function symbols or negation –Standard database query formalism Constraint Datalog –Constraints based on constraint domains –Hierarchies, intervals, discrete sets Polarity-restricted FOL (“Lithium”) –Allows function symbols, negation –Supports modular combination of policies

General policy form uA policy statement has the form:  x 1,…,  x m (Condition  (+/-) Permitted(principal, privilege)) where Condition is a conjunction of literals; principal is individual [HW] or group [LM] privilege can be action [HW] or group [LM] Yale Feigenbaum, Li Cornell Halpern, Weissman Stanford Li, Mitchell, …

Role-based Trust-management (RT) RT 0 : Decentralized Roles RT 1 : Parameterized Roles RT T : for Separation of Duties RT D : for Selective Use of Role memberships RT 2 : Logical Objects RT T and RT D can be used (either together or separately) with any of the five base languages: RT 0, RT 1, RT 2, RT 1 C, and RT 2 C RT 1 C : structured resources RT 2 C : structured resources [Li, Mitchell, Winsborough, …]

Recall example AliceEPub StateU is a university Alice is a student Grants access to university students Trusts universities to certify students Trusts ABU to certify universities StateU ABU

Example RT 0 credentials 1.StateU.stuID  Alice 2.ABU.accredited  StateU 3.EPub.university  ABU.accredited 4.EPub.student  EPub.university.stuID 5.EPub.access  EPub.student Together, five statements prove Alice is entitled to access

Distributed Policy Alice EPub StateU ABU ABU.accredited  StateU COE.stuID  Alice EPub.university  ABU.accredited EPub.student  EPub.university.stuID StateU.stuID  COE.stuID COE

Privacy uPolicy Companies state privacy policy on web site This is legally binding uOutsourcing and coalitions Many companies outsource specific functions Partners may not have same privacy policies Partners may have conflicting business objectives

Web Architecture and Privacy Database System Application Enterprise Portal Policy!Enforcement?

Who cares about privacy? uCompanies with P3P policy P3P policy makes promise to customers Company is legally obligated to comply uOrganizations facing compliance Healthcare, financial institutions Government uCompanies with customer assets “Privacy” means that customer assets are not compromised Banks must preserve secrecy of customer SSN

JetBlue information flow Source: A Anton JetBlue info collected by OpenSkies is shared info with Torch Concepts. Torch combined JB info with data from Acxiom, has no stated privacy policy.

EPAL Concepts uCondition, ruling, obligations If condition then outcome Outcome = ruling  obligations Ruling = { yes, no, don’t care} Obligations: actions that must occur uExamples If employee owns the file then yes If anyone accesses data then don’t care and log the request IBM privacy language

Policy Combination Denied Permitted Denied Permitted Denied = + OK Denied Permitted Denied Permitted Denied = + ??

Policy language design space Permit only Permit / Deny Resolve contradiction Can be contradictory EPAL Ordered

EPAL order priority uIntuitive ? Need to give exception before general case –Birds can fly –Penguins cannot fly uEfficiency Cannot evaluate sub-policies in parallel uScalability How to combine separate sub-policies?

Some examples uUnreachable If male then yes If female then no If manager then no uInapplicable If manager then yes If VP then no If male then no u Ineffective If VP then {run} If manager then {run, jump} u Redundant If manager then {run, jump} If VP then {run} A policy editor could detect these situations Big problem: combination of EPAL policies may not be EPAL policy

Datalog As A Foundation uNatural Security policy statements are if-then rules uPrecise Declarative and widely-understood semantics uTractable No function symbols  tractability Efficient goal-directed evaluation procedures uAvailable technology Extensive Datalog research in LP and DB

Better: Constraint Datalog uWhy constraints: Datalog cannot easily express permissions about structured resources and ranges uWhat is Constraint Datalog Special form of CLP; query language for Constraint DB uA Constraint Datalog rule: R 0 (x 0 ) :- R 1 (x 1 ),..., R n (x n ),  (x 0, x 1, …, x n ) –x 0, x 1, …, x n are tuples of variables –  is a constraint in all the variables

Example Policy with Constraints uA grants to B the permission to connect to hosts in the domain “stanford.edu” at port 80, valid from time t 1 to t 3, and allows B to further delegate grantConnect(A, B, h, p, v) :- h   edu,stanford , p=80, v  [t 1, t 3 ] grantConnect(A, x, h, p, v) :- grantConnect(B, x, h, p, v), h   edu,stanford , p=80, v  [t 1, t 3 ]

Useful Constraint Domains uTree domains: Path expressions  a1,a2, ,ak  –E.g.,  pub,software  for /pub/software Primitive constraint: x=y or x   a1, ,ak , where   {=, <, , ,  } uRange domains: Primitives: x=y, x=c, or, x  (c1, c2) uDiscrete domains with finite sets: Primitive constraint: x=y, x  {c1,c2, ,cj}

RT Accomplishments uRT language design uRT deduction, trust negotiation Fast distributed deduction, constraints uComparative analysis: KeyNote, SPKI 2.0 uSafety and availability analysis HRU undecidability => RT poly-time, NP, Pspace uSample applications August scheduling, UStorIt file sharing, ATN, … uTransitions IBM privacy, InnerPresence, NTT DoCoMo, Hitachi

Implementation Status uJava inference engine for RT 0 uPreliminary version of RTML an XML-based Encoding of RT statements XML Schemas and parser exist uApplications U-STOR-IT: Web-based file storage and sharing August: A Distributed Calendar Program Automated Trust Negotiation Demo by NAI TNT Trust Negotiation architecture at BYU

Architecture design for policy-based portal site Portal site Web service invoke service return results(customized by General Policy) User Service Provider access Authentication Authority Attribute Authority(A) Bob’s Policy(A) -Bob.Address <- CA -Bob.Job <- Student … General Policy -Discount <- Student … Web service Attribute Authority(B) Policy Decision Authority Bob’s Policy(B) -Bob.MembershipPoint <- high … invoke service return results(customized by Bob’s Policy(B)) Attribute Assertion Authentication Assertion Bob’s Policy(A) -Bob.Address <- CA -Bob.Job <- Student … federated ID User doesn’t have a federated ID User has a federated ID Role-based Trust Management (TM) language (SOAP) (SAML) UDDI Registry register discover create (UDDI) Policy Decision Authority Attribute Authority(B) Attribute Authority(A) Authentication Authority Credential Chains (Liberty Alliance) Hitachi

Open Problems uEvaluation Complete study of EPAL uExtend RT languages Denying policies – for policy combination Obligations uDistributed enforcement algorithms uPolicy lifecycle tools Safety analysis, resolve conflicts in policy combination Enforcement policy  Advertised policy ?

Critical Infrastructure Protection uMany critical infrastructures, national and DoD-specific, are decentralized uData sharing essential for operation, but data compromise can be catastrophic uResearch Question: How to share data safely, using policies that are easy to formulate, enforce, maintain uApproach: diffuse trust management

Assuring Software Quality uTechnology applicable to managing process interaction Process A delegates rights to process B –For limited purpose, limited time, limited locations Fine-grained control of process actions Works for diffuse systems that escape normal controls imposed by localized OSs uDiffuse principle of least privilege

DoD Impact uDynamic coalitions Partial sharing based on partial trust uJoint Vision 2010 / Joint Vision 2020 of “Network Centric” operations Can use policy to push data, overcome network bandwidth limitations Right data to right place at right time

Plans uApplications and Transitions Work with XrML developers on language and algorithm IBM Privacy Project –Extend RT algorithms to EPAL, P3P applications Pursue commercial and DOD applications Larger policy sets, Network policies uGeneralize results: RT  Datalog  PFOL uImprove implementation: RT 0  Datalog  PFOL uPolicy development environment and tools User interface, XML-format, interoperability Testing methodology, analysis methods

Automated Trust Negotiation uCredentials may contain sensitive information need protection just as other resources deduction must be interactive uThe Trust Target Graph (TTG) protocol supports RT 0, which has delegation supports distributed discovery of statements supports Ack policies, which also protects against unauthorized leakage of attribute information uCryptographic protocols for ATN Oblivious Signature-Based Envelope (OSBE)

August: Distributed Calendar uUsers define groups, maybe interdependent uEach user has a calendar and can specify policy which determines who is allowed to view each part of the user's calendar who is allowed to add an activity of a certain kinds at a certain time

U-STOR-IT: Web-based sharing uUser auth: SSL and X.509 certificates uUsers define interdependent groups uLocker Hierarchical folder of heterogeneous files Locker/file upload/access policy set by owner uPolicies translated into RT uImplement w/Java Servlets and MySQL