Fall 2010/Lecture 301 CS 426 (Fall 2010) Role Based Access Control.

Slides:



Advertisements
Similar presentations
RBAC Role-Based Access Control
Advertisements

ROWLBAC – Representing Role Based Access Control in OWL
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.
A THREE TIER ARCHITECTURE FOR ROLE-BASED ACCESS CONTROL Ravi Sandhu and Hal Feinstein Seta Corporation McLean, VA Ongoing NIST-funded project Other Project.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role-Based Access Control CS461/ECE422 Fall 2011.
ROLE BASED ACCESS CONTROL
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Access Control A Meta-Model 1Dennis Kafura – CS5204 – Operating Systems.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Access Control RBAC Database Activity Monitoring.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Administrative Scope and Role-Based Administration Jason Crampton Information Security Group Royal Holloway, University of London.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
“A Service-enabled Access Control Model for Distributed Data” Mark Turner, Philip Woodall Pennine Forum - 16 th September 2004.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Role-Based Access Control Standard
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Presented By: Matthew Garrison. Basics of Role Based Access Control  Roles are determined based on job functions within a given organization  Users.
Li Xiong CS573 Data Privacy and Security Access Control.
Role-Based Access Control Richard Newman (c) 2012 R. Newman.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT June 21, 2012
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
Role Based Access Control Update HL7 Working Group Meeting San Diego, CA - January 2007 Presented by: Suzanne Gonzales-Webb, CPhT VHA Office of Information.
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
Li Xiong CS573 Data Privacy and Security Access Control.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Database Security Chapter Terms Security – all the processes and mechanisms by which computer-based equipment, information and services are.
Computer Security: Principles and Practice
Access Control.
IS 2150 / TEL 2810 Introduction to Security
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Morteza Amini; 2nd Semester ; Database Security; Sharif Univ. of Tech. Role-Based Access Control Overview user_sessions (RH) Role Hierarchy session_roles.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
CSCE 522 Access Control.
Role-Based Access Control (RBAC)
Information Security CS 526
Institute for Cyber Security
Institute for Cyber Security
Access Control Role-based models RBAC
Security Enhanced Administrative Role Based Access Control Models
Role-Based Access Control (RBAC)
Role-Based Access Control Richard Newman (c) 2012 R. Newman
Role Based Access Control
ASCAA Principles for Next-Generation Role-Based Access Control
Role-Based Access Control George Mason University and
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
NIST Standard for Role-Based Access Control
Presentation transcript:

Fall 2010/Lecture 301 CS 426 (Fall 2010) Role Based Access Control

Fall 2010/Lecture 302 Background: Role Based Access Control Non-role-based systems Role-Based Access Control Systems (RBAC) AliceBobCarlDaveEva Windows Account Linux Account WebSphere Account DB2 Account Users: Permissions: AliceBobCarlDaveEva Windows Account Linux Account WebSphere Account DB2 Account DB AdminWeb AdminSoftware Developer Users: Roles: Permissions:

Fall 2010/Lecture 303 ROLE-BASED ACCESS CONTROL (RBAC) Motivating Problem: how to administer user-permission relation –Different from DAC and MAC, which deal with processes in operating systems Roles as a level of indirection –Butler Lampson: "all problems in Computer Science can be solved by another level of indirection" RBAC is multi-faceted and open ended –Extensions: ARBAC (administrative), CBRAC (constraint), dRBAC (dynamic), ERBAC (enterprise), fRBAC (flexible), GRBAC (generalized), HRBAC (hierarchical), IRBAC (interoperability), JRBAC (Java), LRBAC (Location), MRBAC (Management), PRBAC (privacy), QRBAC (QoS), RRBAC(Rule), SRBAC(Spatial), TRBAC (temporal), V, W, x. –Non extension: OrBAC

Fall 2010/Lecture 304 Why Roles? Fewer relationships to manage –possibly from O(mn) to O(m+n), where m is the number of users and n is the number of permissions Roles add a useful level of abstraction Organizations operate based on roles A role may be more stable than –the collection of users and the collection of permissions that are associated with it

Fall 2010/Lecture 305 Groups vs. Roles Depending on the precise definition, can be the same or different. Some differences that may or may not be important, depending on the situation –Answer 1: sets of users vs. sets of users as well as permissions –Answer 2: roles can be activated and deactivated, groups cannot Groups can be used to prevent access with negative authorization. Roles can be deactivated for least privilege –Answer 3: can easily enumerate permissions that a role has, but not for groups

Fall 2010/Lecture 306 RBAC96 FAMILY OF MODELS (Sandhu et al.) RBAC0 BASIC RBAC RBAC3 ROLE HIERARCHIES + CONSTRAINTS RBAC1 ROLE HIERARCHIES RBAC2 CONSTRAINTS

Fall 2010/Lecture 307 RBAC0 ROLES USER-ROLE ASSIGNMENT PERMISSION-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS

Fall 2010/Lecture 308 PERMISSIONS Left abstract in the RBAC96 model Permissions are positive No negative permissions or denials –RBAC defines a closed policy, i.e., all accesses are denied unless they are explicitly authorized No duties or obligations –Example obligation: can access patient document, but must notify patient, or must delete after 30 days

Fall 2010/Lecture 309 RBAC0: Formal Model Vocabulary: U, R, P, S (users, roles, permissions, and sessions) Static relations: –PA  P × R (permission assignment) –UA  U × R (user assignment) Dynamic relations: –user: S  Ueach session has one user –roles: S  2 R and some activated roles requires roles(s)  { r | (user(s), r)  UA } Session s has permissions  r  roles(s) { p | (p, r)  PA }

Fall 2010/Lecture 3010 RBAC1 ROLES USER-ROLE ASSIGNMENT PERMISSION-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE HIERARCHIES

Fall 2010/Lecture 3011 HIERARCHICAL ROLES (ex 1) Health-Care Provider Physician Primary-Care Physician Specialist Physician

Fall 2010/Lecture 3012 HIERARCHICAL ROLES (ex 2) Engineer Hardware Engineer Software Engineer Supervising Engineer

Fall 2010/Lecture 3013 Semantics of Role Hierarchies User inheritance –r1  r2 means every user that is a member of r1 is also a member of r2 Permission inheritance –r1  r2 means every permission that is authorized for r2 is also authorized r1 Activation inheritance –r1  r2 means that activating r1 will also activate r2 Physician Health-Care Provider Permission and Activation inheritance have different effect when there are constraints about activation.

Fall 2010/Lecture 3014 RBAC1: Formal Model U, R, R, S, PA, UA, and user unchanged from RBAC0 RH  R × R : a partial order on R, written as  –When r1  r2, we say r1 is a senior than r1, and r2 is a junior than r1 roles: S  2 R –requires roles(s)  { r |  r’ [(r’  r) & (user(s), r’)  UA] } Session s includes permissions  r  roles(s) { p |  r’’ [(r  r’’) & (p, r’’)  PA] }

Fall 2010/Lecture 3015 RBAC2: RBAC0 + Constraints No formal model specified Example constraints –Mutual exclusion –Pre-condition: Must satisfy some condition to be member of some role E.g., a user must be an undergrad student before being assigned the UTA role –Cardinality

Fall 2010/Lecture 3016 Mutual Exclusion Constraints Mutually Exclusive Roles –Static Exclusion: No user can hold both roles often referred to as Static Separation of Duty constraints Preventing a single user from having too much permissions –Dynamic Exclusion: No user can activate both roles in one session Often referred to as Dynamic Separation of Duty constraints Interact with role hierarchy interpretation

Fall 2010/Lecture 3017 Cardinality Constraints On User-Role Assignment –at most k users can belong to the role –at least k users must belong to the role –exactly k users must belong to the role On activation –at most k users can activate a role –…

Fall 2010/Lecture 3018 Why Using Constraints? For laying out higher level organization policy –Only a tool for convenience and error checking when admin is centralized Not absolutely necessary if admin is always vigilant, as admin can check all organization policies are met when making any changes to RBAC policies –A tool to enforce high-level policies when admin is decentralized

Fall 2010/Lecture 3019 RBAC3 ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS

Fall 2010/Lecture 3020 Products Using RBAC Data Base Management Systems (DBMS) Enterprise Security Management –IBM Tivoli Identity Manager (central administration and provisioning of accounts, resources, etc) Many operating systems claim to use roles –Though only in very limited way

Fall 2010/Lecture 3021 RBAC Economic Impact Study in 2002 Based on interviews with software developers and companies that integrate RBAC products into their business operations (end users), the Research Triangle Institute (RTI) estimates that by 2006 between 30 and 50 percent of employees in the service sector and between 10 and 25 percent of employees in the non-service sectors will be managed by RBAC systems. RTI also estimates that this degree of market penetration will result in economic benefits to the U.S. economy through 2006 of approximately $671 million in net present value terms. This estimate is conservative because it reflects only the administrative and productivity benefits from RBAC.

Fall 2010/Lecture 3022 The NIST Standard Proposed NIST Standard for Role-Based Access Control. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. TISSEC, August Proposed NIST Standard for Role-Based Access Control American National Standards Institute Standard, 2004 –Has a number of flaws, including with typos, errors in math definitions, and others high-level design choices

Fall 2010/Lecture 3023 Overview of the NIST Standard for RBAC Dynamic Separation of Duties Core RBAC Hierarchical RBAC Static Separation of Duties

Research Challenges in RBAC Role engineering –Design roles for an access control scenario. –Top down approach: start from analyzing business requirement. –Bottom up approach: Role Mining: mine existing access control data for roles Effective administration of RBAC systems –Especially help ensure updates still lead to useful states Effective usage of constraints Fall 2010/Lecture 3024

CS426Fall 2010/Lecture 1925 Readings for This Lecture RBAC96 Family –R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. “Role-Based Access Control Models”. IEEE Computer, 29(2):38--47, February 1996.

CS426Fall 2010/Lecture 1926 Coming Attractions … Public Key Cryptography