April 27, 20051 The Role Graph Model and Tools for Design of Access Control Sylvia Osborn Dept. of Computer Science The University of Western Ontario.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

Role Activation Hierarchies Ravi Sandhu George Mason University.
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Justification-based TMSs (JTMS) JTMS utilizes 3 types of nodes, where each node is associated with an assertion: 1.Premises. Their justifications (provided.
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Access Control RBAC Database Activity Monitoring.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies (2000) Author: Sylvia Osborn, Ravi Sandhu,Qamar Munawer.
Expert System Human expert level performance Limited application area Large component of task specific knowledge Knowledge based system Task specific knowledge.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Data Flow Analysis Compiler Design Nov. 3, 2005.
Essentials of interaction diagrams Lecture Outline Collaborations Interaction on collaboration diagrams Sequence diagrams Messages from an object.
GRANULARITY OF LOCKS IN SHARED DATA BASE J.N. Gray, R.A. Lorie and G.R. Putzolu.
Algorithmic Problems in Algebraic Structures Undecidability Paul Bell Supervisor: Dr. Igor Potapov Department of Computer Science
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Software Architecture for DSD The “Uses” Relation.
Data Modeling Using the Entity-Relationship Model
CSE314 Database Systems Data Modeling Using the Entity- Relationship (ER) Model Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson Ed Slide Set.
MANDATORY FLOW CONTROL Xiao Chen Fall2009 CSc 8320.
TM CG Notes Latest: Outline Big Picture architecture Topic Maps – CG – Notio Notes – Amine Notes – CharGer Notes – Prolog – Analogy –
Role-Based Access Control Richard Newman (c) 2012 R. Newman.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Security Planning and Administrative Delegation Lesson 6.
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
Requirements as Usecases Capturing the REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
Li Xiong CS573 Data Privacy and Security Access Control.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Protection Models Yeong-Tay Timothy Sun September 27, Dennis Kafura – CS5204 – Operating Systems.
Unified Modeling Language © 2002 by Dietrich and Urban1 ADVANCED DATABASE CONCEPTS Unified Modeling Language Susan D. Urban and Suzanne W. Dietrich Department.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
School of Computer Science, The University of Adelaide© The University of Adelaide, Control Data Flow Graphs An experiment using Design/CPN Sue Tyerman.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Nov. 12, Database Applications of Role-Based Access Control Sylvia Osborn The University of Western Ontario Nov. 12, 2001.
Winter 2011SEG Chapter 11 Chapter 1 (Part 1) Review from previous courses Subject 1: The Software Development Process.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Computer Security: Principles and Practice
2/1/20161 Computer Security Foundational Results.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
©Silberschatz, Korth and Sudarshan2.1Database System Concepts Chapter 2: Entity-Relationship Model Entity Sets Relationship Sets Mapping Constraints Keys.
Algorithmic Problems in Algebraic Structures Undecidability Paul Bell Supervisor: Dr. Igor Potapov Department of Computer Science
IT 5433 LM2 ER & EER Model. Learning Objectives: Explain importance of data modeling Define and use the entity-relationship model Define E/R terms Describe.
HR Development Division PA Office of Administration Room 511 Finance Building Harrisburg PA Enterprise Portal Community Management Overview Click.
COP Introduction to Database Structures
Presented By: Smriti Bhatt
Talk Outline Motivation and Background. Policy Contexts.
Access Control Model SAM-5.
Role-Based Access Control (RBAC)
All-pairs Shortest paths Transitive Closure
Protection and Security
Chapter - 12 GRAPH MATRICES AND APPLICATIONS.
Past, Present and Future
Software Testing and Maintenance 1
Unified Modeling Language
Multi-Way Search Trees
Role-Based Access Control Richard Newman (c) 2012 R. Newman
مدل مديريتي كنترل دسترسي نقش مبنا
Computer Security Foundations
An information flow model FM is defined by
Role-Based Access Control George Mason University and
Complexity Theory: Foundations
Presentation transcript:

April 27, The Role Graph Model and Tools for Design of Access Control Sylvia Osborn Dept. of Computer Science The University of Western Ontario

April 27, Outline of Talk 1.Role Graph Model 2.Some Basic Tools 3.Information Flow Analysis 4.Other things we are working on

April 27, The Role Graph Model: Three Planes (with Matunda Nyanchama)

April 27, Role Graph Properties there is a single MaxRole, there is a single MinRole, the graphs are acyclic, there is a path from MinRole to every role r i, there is a path from every role r i to MaxRole, distinguish between direct privileges (not available in any of the role’s juniors) and effective privileges (direct privileges together with all inherited privileges)

April 27, Role Graph Properties, cont’d for any two roles r i and r j, if effective(r i )  effective(r j ), then there must be a path from r i to r j by convention we draw the graphs with MaxRole at the top, MinRole at the bottom, and junior roles lower on the page than their seniors. We also remove transitive edges from the display to make the graph less cluttered.

April 27, Role Graph Algorithms We have developed algorithms to: –add a role giving its direct privileges, expected juniors and seniors –add a role giving effective privileges –add/delete a privilege to/from a role –add/delete an edge All run in time polynomial in size of graph and size of privilege sets. All algorithms abort if a cycle would be created in the role graph. Otherwise, restore role graph properties. We have also discussed how to export the design to a relational DBMS, or a Unix system with ACLs.

April 27, Groups Other RBAC models do not consider groups. Groups are organized into a group graph. Here, edges represent proper subset relationship. In small applications, each user can be regarded as a group of cardinality 1. In large applications, do not want individual users. Group modeling focuses on what users have in common. E.g. can have a group for users with the same qualifications, or for members of a committee, who might have different job titles. Can force subset relationship by making subgroups.

April 27, Role design vs. Group design Role design involves deciding what permissions are necessary or required for a job function, task or service. Group design - deciding what groups to have - involves focusing on what might be useful sets of users to have, rather than on the details of what they will use or do. Assigning users to groups involves looking at some qualifications or requirements of each user. In a corporate environment, role design might be carried out by a system administrator, whereas group assignments might be carried out by HR.

April 27, Privileges There can be implications among privileges. Based on OODB work (by Rabitti, Bertino, Kim and Woelk), can have implications based on (s, o, a) –Subject considerations correspond to roles –Object containment –Access modes (e.g. write does or does not imply read) –Also from schema to instance Carries over fairly naturally to XML data

April 27, Static vs. Dynamic aspects The following are fairly static: –Design/alteration of the role graph –Design/alteration of the group graph –Design of the implication patterns in the privileges plane Less static would be: –Assignment of users to groups –Assignment of users/groups to roles Most dynamic: –Role activation/deactivation

April 27, Desirable Tools Given a user, what are all the roles they can activate or are assigned to? - have Given a user, what are all the privileges they can have? - some effort. Given a privilege, who are all the users who can perform this operation? - harder Given a role, who are all the users who can activate this role? - have In general, what are the consequences of our model?

April 27, Prototype Implementation

April 27, Click on a group or user node:

April 27, Click on a role:

April 27, Information Flow Analysis (based on a paper in 2002 ACM SACMAT) RBAC early on claimed to be more general than DAC and MAC (also known as LBAC) Work by Sandhu and Munawer showed how to simulate various forms of DAC Work by Sandhu showed how to simulate MAC Work by Osborn showed how, given a role graph and security labels, to test if LBAC properties are satisfied. What was missing was to try to convert from RBAC to LBAC – i.e. to show for a given RBAC system what lattice the role graph might correspond to, which shows what information flows are possible

April 27, Properties of LBAC models All objects and subjects have a security label The security labels form a lattice Reading and writing are typically the only operations considered Simple Security Property: subject s can read object o only if label(s)  label(o) Writing is governed by the Liberal  -property or the strict  -property Liberal  -property: subject s can write object o only if label(s) ≤ label(o) Strict  -property: subject s can write object o only if label(s) = label(o)

April 27, Information Flow within a Single Role The smallest unit of privilege assignment is a role A user, acting in a role which contains (o 1, r) and (o 2, w), can cause information to flow from o 1 to o 2. Also, any object represents information flow when (o, w) is in a role and (o, r) is in the same or possibly a different role. We also assume information flow from (o, r) to (o, w). (i.e., object o will ultimately have one label.)

April 27, Initial Can-Flow Graph Example Role Graph with effective privileges R3 {(a,r),(b,r),(b,w),(c,r),(c,w)} R1 {(a,r),(b,w)} R2 {(a,r),(b,r)}

April 27, After Collapsing Cycles

April 27, Considerations for the Algorithm Trying to get the fairest view of what information flows there can be. If in every role graph, MaxRole is considered in the algorithm, then the flow graph would degenerate into a single node, since MaxRole has all the privileges. Really only need to look at roles that can be assigned. Sandhu’s models have a concept of a session, which captures the notion of which roles are active concurrently. Can also have constraints preventing two roles from being activated together.

April 27, Algorithm for each role r k in URA for some user for each privilege (o, a) create a node for (r k, o, a) for each pair in r k of form (o i, r) (o j, w) put edge from (r k, o i, r) to (r k, o j, w) for each object o if nodes n i, n j contain the same object o then insert edges n i to n j and n j to n i for all roles r i, r k permitted in same session by URA or constraints for all pairs (r i, o 1, r) and (r k, o 2, w) add edge from (r i, o 1, r) to (r k, o 2, w) collapse cycles

April 27, This example from Sandhu Gives this flow: With the constraint that L users are assigned LW and LR, etc.

April 27, Example yielding a non-lattice This role graph: Gives this flow: R1{(c,r),(a,w)} R2{(c,r), (b,w) } R3{(d,r),(a,w)} R4{(d,r),(b,w)} a c d b

April 27, Summary of Information Flow Work If the flow graph is a lattice, we have a solution to mapping an arbitrary RBAC system to an LBAC system with the same information flow. i.e., we can consider the flow graph to be a candidate security labeling. If it is not a lattice, what do we do? One possibility is to merge common upper bounds (like a and b in the previous example). In any case, the flow graph provides useful information.

April 27, Other things A.Role graph administration: Looking at a decentralized administrative model. Which is intuitive to people in business. A model that leaves the underlying role graph and its properties and algorithms intact. To have administrative roles part of the role graph. To allow a hierarchy of administrative roles. To recognize that the “reports-to” graph and the role graph may be different.

April 27,

April 27, Administrative Domains Set of roles with a top role called the domain ID The administrative domain contains all roles junior to the domain ID except for MinRole The default domain whose domain ID is MaxRole does contain MinRole. All operations within a domain must work with privileges already available in the domain ID and must only deal with roles within the domain. This way operations cannot alter surrounding domains. Privileges are added to a domain ID by an administrator of a surrounding domain.

April 27, Some properties of Administrative Domains Administrative Domains must not overlap - changes made in one domain would affect another domain.

April 27, B.Propagation of Privileges –We have explored the privileges plane in some detail for propagation of privileges in general, and extended this to security over XML documents. C. Delegation –Currently looking at delegation within the context of the Role Graph Model and our administrative model. Other Things, cont’d

April 27, Conclusions Important to have a good reference model so that all the dimensions of a problem can be explored. Important to realize whether you need a model or a mechanism. Papers can be found at: