1 ACSAC 2002 © Mohammad al-Kahtani 2002 A Model for Attribute-Based User-Role Assignment Mohammad A. Al-Kahtani Ravi Sandhu George Mason University SingleSignOn.net,

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Delta Confidential 1 5/29 – 6/6, 2001 SAP R/3 V4.6c PP Module Order Change Management(OCM)
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advanced Piloting Cruise Plot.
Kapitel 21 Astronomie Autor: Bennett et al. Galaxienentwicklung Kapitel 21 Galaxienentwicklung © Pearson Studium 2010 Folie: 1.
Cyber-Identity, Authority and Trust in an Uncertain World
SACMAT 03© Mohammad Al-Kahtani1 Induced Role Hierarchies with Attribute-Based RBAC Mohammad A. Al-Kahtani Ravi Sandhu George Mason University NSD Security,
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
ARBAC99 (Model for Administration of Roles)
Ravi Sandhu Venkata Bhamidipati
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
Gail-Joon Ahn and Ravi Sandhu George Mason University Myong Kang and Joon Park Naval Research Laboratory Injecting RBAC to Secure a Web-based Workflow.
© 2004 Ravi Sandhu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology.
ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.
A THREE TIER ARCHITECTURE FOR ROLE-BASED ACCESS CONTROL Ravi Sandhu and Hal Feinstein Seta Corporation McLean, VA Ongoing NIST-funded project Other Project.
© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
© 2005 Ravi Sandhu Access Control Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
Chapter 1 The Study of Body Function Image PowerPoint
Author: Graeme C. Simsion and Graham C. Witt Chapter 8 Organizing the Data Modeling Task.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Chapter 1 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
ZMQS ZMQS
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
ABC Technology Project
© S Haughton more than 3?
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
VOORBLAD.
Squares and Square Root WALK. Solve each problem REVIEW:
© 2012 National Heart Foundation of Australia. Slide 2.
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chemistry Seventh Edition Raymond Chang Chapter 7 PowerPoint.
A SMALL TRUTH TO MAKE LIFE 100%
1 Unit 1 Kinematics Chapter 1 Day
PSSA Preparation.
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
How Cells Obtain Energy from Food
Chapter 30 Induction and Inductance In this chapter we will study the following topics: -Faraday’s law of induction -Lenz’s rule -Electric field induced.
CpSc 3220 Designing a Database
Presentation transcript:

1 ACSAC 2002 © Mohammad al-Kahtani 2002 A Model for Attribute-Based User-Role Assignment Mohammad A. Al-Kahtani Ravi Sandhu George Mason University SingleSignOn.net, Inc. & George Mason University

2 ACSAC 2002 © Mohammad al-Kahtani 2002 Presentation Roadmap 1.Introduction 2.Problem Description 3.Suggested Solution 4.Case Study 5.Expressing MAC

3 ACSAC 2002 © Mohammad al-Kahtani 2002 Introduction Role-Based Access Control (RBAC): A proven alternative to DAC and MAC RBAC basic components: 1. Users 2. Roles 3. Permissions

4 ACSAC 2002 © Mohammad al-Kahtani 2002 Introduction Simplified RBAC Model Role Hierarchy Users (UA) User Assignment (PA) Permission Assignment Roles Permiss- ions

5 ACSAC 2002 © Mohammad al-Kahtani 2002 Presentation Roadmap 1.Introduction 2.Problem Description 3.Suggested Solution 4.Case Study 5.Expressing MAC

6 ACSAC 2002 © Mohammad al-Kahtani 2002 Problem Description In RBAC, user-to-role assignment is done manually Many enterprises have huge customer bases: Banks Utilities companies Popular web sties Manual assignment becomes a formidable task

7 ACSAC 2002 © Mohammad al-Kahtani 2002 Presentation Roadmap 1.Introduction 2.Problem Description 3.Suggested Solution 4.Case Study 5.Expressing MAC

8 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Modify RBAC to allow automatic user-role assignment Introducing Authorization Rules Authorization rule structure: Constraints Attributes Expression Roles

9 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Rule-Based RBAC (RB-RBAC) Attributes Expressions Users Roles Permissions Constraints Attributes values

10 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Attributes Values: 1. Stored locally 2. Provided by users 3. Other means Attributes Expressions Users Roles Permissions Constraints Attributes values

11 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Attributes Expressions: 1. Expressed in RB-RBAC language 2. Constitute LHS of authorization rules RB-RBAC production rules are in BNF notation. Attributes Expressions Users Roles Permissions Constraints Attributes values

12 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Constraints: Future work Attributes Expressions Users Roles Permissions Constraints Attributes values

13 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Seniority Levels Relations among authorization rules Rule i: Rule j: Rule i is senior to Rule j Attributes Expression Roles Attributes Expression Roles Logically implies

14 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Seniority Levels Anomalies 1. Redundancy Rule i is senior to Rule j Rule i Rule j Role 1 Role 1 & Role 2

15 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Seniority Levels anomalies 1. Redundancy Rule i is senior to Rule j Rule i Rule j Role 1 Role 2 Role 1 is senior to Role 2

16 ACSAC 2002 © Mohammad al-Kahtani 2002 Suggested Solution Seniority Levels anomalies 2. Inconsistency Rule i is senior to Rule j Rule i Rule j Role 1 Role 2 Role 1 and 2 are mutually exclusive

17 ACSAC 2002 © Mohammad al-Kahtani 2002 Presentation Roadmap 1.Introduction 2.Problem Description 3.Suggested Solution 4.Case Study 5.Expressing MAC

18 ACSAC 2002 © Mohammad al-Kahtani 2002 Case Study Online Entertainment Store Suggested rating system Attributes Age Country Rating LevelsRoles StrictChild Less StrictJuvenile LiberalAdolescent GraphicAdult

19 ACSAC 2002 © Mohammad al-Kahtani 2002 Case Study Attributes: Age 1.Rule 1:: (Age 3) Child 2.Rule 2:: (Age 11) Juvenile 3.Rule 3:: (Age 16) Adolescent 4.Rule 4:: (Age 18) Adult AgeRole 3 Child 11 Juvenile 16 Adolescent 18 Adult

20 ACSAC 2002 © Mohammad al-Kahtani 2002 Case Study Attributes: Country 1. Rule 1:: (Country IN {A..Z}) Juvenile 2. Rule 2:: (Country IN {{A..Z} – {Saudi, Sudan}}) Adolescent 3. Rule 3:: (Country IN {{A..Z} – {China, India, Saudi, Sudan, Egypt, Indonesia, Malaysia, Singapore}}) Adult CountryRole Country in {A..Z}Juvenile Country in {{A..Z} – {Saudi, Sudan}} Adolescent Country in {{A..Z} – {China, India, Saudi, Sudan, Egypt, Indonesia, Malaysia, Singapore}} Adult

21 ACSAC 2002 © Mohammad al-Kahtani 2002 Case Study Authorization rules for the 2 attributes: 1.Rule 1:: (Age 3) AND (country IN {A..Z}) Child 2.Rule 2:: (Age 11) AND (country IN {A..Z}) Juvenile 3.Rule 3:: (Age 16) AND (country IN {{A..Z} – {Saudi, Sudan}}) Adolescent 4.Rule 4:: (Age 18) AND (Country IN {{A..Z} – {China, India, Saudi, Sudan, Egypt, Indonesia, Malaysia, Singapore }}) Adult

22 ACSAC 2002 © Mohammad al-Kahtani 2002 Presentation Roadmap 1.Introduction 2.Problem Description 3.Suggested Solution 4.Case Study 5.Expressing MAC

23 ACSAC 2002 © Mohammad al-Kahtani 2002 Expressing MAC Adult Adolescent Juvenile Child Adult Write (AW) Adolescent Write (DW) Juvenile Write (JW) Child Write (CW) Security Lattice Role Hierarchies Adolescent Read (DR) Juvenile Read (JR) Child Read (CR) Adult Read (AR)

24 ACSAC 2002 © Mohammad al-Kahtani 2002 Expressing MAC Authorization Rules: Rule 1:: (Age 3) AND (country IN {A..Z}) CR AND CW Rule 2:: (Age 11) AND (country IN {A..Z}) JR AND JW Rule 3:: (Age 16) AND (country IN {{A..Z} – {Saudi, Sudan}}) DR AND DW Rule 4:: (Age 18) AND (Country IN {{A..Z} –{China, India, Saudi, Sudan, Egypt, Indonesia, Malaysia, Singapore}}) AR AND AW