FRAMEWORK FOR AGENT-BASED ROLE DELEGATION Presentation by: Ezedin S. Barka UAE University.

Slides:



Advertisements
Similar presentations
RBAC Role-Based Access Control
Advertisements

Role Based Access Control
1 ACSAC 2002 © Mohammad al-Kahtani 2002 A Model for Attribute-Based User-Role Assignment Mohammad A. Al-Kahtani Ravi Sandhu George Mason University SingleSignOn.net,
1 Framework for Role-Based Delegation Models (RBDMs) By: Ezedin S.Barka and Ravi Sandhu Laboratory Of Information Security Technology George Mason University.
Attribute Mutability in Usage Control July 26, 2004, IFIP WG11.3 Jaehong Park, University of Maryland University College Xinwen Zhang, George Mason University.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Role-Based Access Control Prof. Ravi Sandhu George Mason University and NSD Security SACMAT 2003.
1 SACMAT 2002 © Oh and Sandhu 2002 A Model for Role Administration Using Organization Structure Sejong Oh Ravi Sandhu * George Mason University.
ARBAC99 (Model for Administration of Roles)
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
Ravi Sandhu Venkata Bhamidipati
Institute for Cyber Security
PBDM: A Flexible Delegation Model in RBAC Xinwen Zhang, Sejong Oh George Mason University Ravi Sandhu George Mason University and NSD Security.
1 A Model of OASIS Role-Based Access Control and Its Support for Active Security Rick Murphy, IT 862, Spring 2005.
ARBAC 97 (ADMINISTRATIVE RBAC)
Role Activation Hierarchies Ravi Sandhu George Mason University.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
How to do Discretionary Access Control Using Roles Ravi Sandhu Qamar Munawer.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
Gail-Joon Ahn and Ravi Sandhu George Mason University Myong Kang and Joon Park Naval Research Laboratory Injecting RBAC to Secure a Web-based Workflow.
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
ISA 662 RBAC-MAC-DAC Prof. Ravi Sandhu. 2 © Ravi Sandhu RBAC96 ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE.
An ORACLE Implementation of the PRA97 Model for Permission-Role Assignment Ravi Sandhu Venkata Bhamidipati George Mason University.
A Role-Based Delegation Model and some extensions By: Ezedin S.Barka Ravi Sandhu George Mason University.
ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.
A THREE TIER ARCHITECTURE FOR ROLE-BASED ACCESS CONTROL Ravi Sandhu and Hal Feinstein Seta Corporation McLean, VA Ongoing NIST-funded project Other Project.
INFS 767 Fall 2003 Administrative RBAC
© 2005 Ravi Sandhu Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.
© 2005 Ravi Sandhu Access Control Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 19 Agency and Liability to Third Parties.
Relational Database and Data Modeling
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
CHAPTER 29 AGENCY: CREATION AND TERMINATION
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Lecture plan Outline of DB design process Entity-relationship model
Internal Control–Integrated Framework
Visual 3.1 Delegation of Authority & Management by Objectives Unit 3: Delegation of Authority & Management by Objectives.
Chapter 2 Entity-Relationship Data Modeling: Tools and Techniques
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Lesson 3: Managing User Access and Security (Cache Administrators only)
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Access Control RBAC Database Activity Monitoring.
Agenda Who is Secured What is Secured Logic and the Effective Permissions Guidelines and Best Practices.
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies (2000) Author: Sylvia Osborn, Ravi Sandhu,Qamar Munawer.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Li Xiong CS573 Data Privacy and Security Access Control.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
Role-Based Access Control Richard Newman (c) 2012 R. Newman.
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
Li Xiong CS573 Data Privacy and Security Access Control.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Privilege Management Chapter 22.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Presented By: Smriti Bhatt
CSCE 522 Access Control.
Role-Based Access Control (RBAC)
Institute for Cyber Security
Institute for Cyber Security
Role-Based Access Control (RBAC)
Role-Based Access Control Richard Newman (c) 2012 R. Newman
RBAC-LBAC-DAC Prof. Ravi Sandhu.
Role-Based Access Control George Mason University and
NIST Standard for Role-Based Access Control
Presentation transcript:

FRAMEWORK FOR AGENT-BASED ROLE DELEGATION Presentation by: Ezedin S. Barka UAE University

2 Agenda Role-Based Delegation Review of RBDM Framework RBDM0 RBDM1 Agent-Based Role Delegation (ARBDM) Flat Roles Hierarchical Roles Conclusion

3 Delegation Some active entity in a system delegates authority to another active entity to carry out some function on behalf of the former Delegation can take many forms: Human to machine, Machine to machine, and perhaps even machine to human Human to human (My Focus)

4 Role-Based Delegation What is delegated is a role Authorization for delegation is also role-based Can-delegate ProfessorAssistant (TA)

5 Related Work The RBAC Models (well known and widely accepted) Gasser and McDermott- Human to machine delegation. Gladny- Machine to machine Varadharajan- process to process delegation.

6 The RBAC96 Model (Simplified) Simplified Version of RBAC96 Model U Users R Roles P Permissions RH Role Hierarchy UA User Assignment PA Permission Assignment U Users R Roles PA Permission Assignment P Permissions Simplified Version of RBAC96 Model In Hierarchical roles UA User Assignment

7 RBDM Framework Delegation Characteristics: Permanence, Monotonicity, Totality, Administration, Levels of delegation, Agreements Cascading revocation Grant-dependency revocation

8 RBDM Framework.. Cont. Addressing every characteristic as mutually exclusive is a formidable task, and can get very complicated Used a systematic approach to reduce the large number of possible cases Reduced cases were used to build the delegation models

9 Done Under development Not done

10 RBDM Models Temporary delegation RBDM0 (or TRBDM0) RBDM1 (or TRBDM1) Permanent delegation PRBDM0 PRBDM1 Agent-based (ARBDM)

11 Delegation in RBDM0 Delegation is authorized by means of can- delegate relation: can delegate R R. For example, TA Role Professor Role Alice User_O(Prof.)Bob User_O(TA) Alice delegates to Bob (Bob,Prof.) UAD

12 Delegation in ARBDM-Flat Roles Delegation is temporary Delegation is Monotonic (delegator does not loose his membership in the delegated role) Delegation can be total or partial Conducted in two ways: By Role-Participant Agent By Non-Role Participant Agent Only the original member can delegate.

Delegation in ARBDM-Flat Roles…cont. Delegation by Role-Participant Agent Occurrences of Role-Participant Agent Delegation Statically : the delegating role member delegates his role membership to a user who is a member of a predefined role (agent role) for the purpose of further delegating that role to another specified user. Dynamically: the delegating role member can, dynamically, delegate his role to another user who meets a certain criteria set by the security officer, with the authority to further delegate that role. Delegation by Non-Role Participant Agent Only the original member can delegate

Taxonomy for ARBDM 14 Role Participant Agent Non-Role Participant Agent Dynamic Delegation ABRD-DRPAABRD -DNRPA Static Delegation ABRD -SRPAABRD -SNRPA

ARBDM-Dynamic Role Participant Agent Agent who is a third party is assigned to administer the delegation between two different users that belong to two different roles, and that agent has membership in the delegating role. This means that the middleman agent has full power in the delegating role This can be considered as a restricted two-step delegation. A user who wishes to have a third party administers his role delegation can accomplish his wish by delegating his role to an agent with the authority to further delegate that role to another user that meets a criteria, qualifying him to a delegate user

ARBDM-Dynamic Non-Role Participant Agent The ARBDM-DNRP model has the following components: AR is an agent role, which is a regular role with added delegation administration responsibility. UAA U R is many to many agent member to role assignment relation UA = UAO UAD UAA UAA UAD = Agent and delegate members in the same role are disjoint. Users_O (r) = {U (U, r) UAA} Where: UA is the user assignment; UAO is the user assignment of the original members; UAD is the user assignment of the delegate members; and UAA is the assignment of the agent members. 16

Delegation/Revocation in ARBDM- DNRP Delegation in ARBDM-DNRP: Controls role-role delegation by means of the relation can-delegate R AR R Revocation in ARBDM-DNRP: Two ways by using timeouts by allowing any original member of the delegating role to revoke the membership of any delegate member in that role (grant-independent revocation ). 17 (Charlie, a) UAD Delegating Role (a) Agent Role (b) Delegate Role (c) Bob delegates to Charlie Alice User_O (a) (Bob, a) UAA Charlie User_O (c) Example of Agent Based Delegation- Dynamic-Non-Role Participant Agent

ARBDM In Hierarchical Roles (ARBDMH) Goal is to impose restrictions on which users can be delegated to and by which agent. The notion of a prerequisite condition (CR) is a key part of ARBDMH.

ARBDMH Basic Elements Delegation can only be either downwards or cross. Upwards is useless because senior roles inherit all the permission of their junior roles. Due to the inheritance nature of role hierarchies, the agent is limited to a certain range of delegation. A member of a role that is senior to the agent role is also an agent. The addition of role hierarchy introduces a new notion for a user membership in a role: The explicit role membership grants a user the authority to use the permissions of that role because of his/her direct membership to that role. The implicit role membership, on the other hand, grants a user the authority to use the permissions of that role because of that users membership of a role that is senior to the given role. original memberships and delegate memberships produces 4 different combinations of user memberships in each role at any given moment: original/explicit, original /implicit, delegate/explicit, and delegate/implicit Only members of original/explicit and original/implicit roles can serve as agents.

Delegation in ARBDMH The role-role delegation is authorized in ARBDMH by the following relation: Can-delegate AR CR 2R

Example of Delegation in ARBDMH Director Project lead 1 Project lead 2 Production Quality Production Quality Engineer 1 Engineer 1 Engineer 2 Engineer 2 (PE1) (QE1) (PE2) (QE2) Engineer 1 Engineer 2 Engineering Department (ED) E Senior Delegating Agent (SDA) Department Delegating Agent (DDA) Project delegating Project delegating agent1 agent2 An Example Agent Role Hierarchy Example Role Hierarchy

Example of Can-Delegate Delegation RangePrerequisite Condition Agent Role [E1, PL1)EDPDA1 [E2, PL2)EDPDA2 [PL2, PL2] ED PL1 DDA [PL1, PL1] ED PL2 DDA

Revocation in ARBDMH Two Approaches: Revocation Using Timeout A duration constraint is attached to each delegation relation so that when the assigned time expired, the delegation is also expired Human Revocation By either the security officer or by the original users in the delegating role

Conclusion Addressed the agent-based role delegation, which is one of delegation characteristics described in the literature by Barka and Sandhu [BS2000]. Described a systematic approach in which an agent-based delegation can be implemented. Identified two manifestations, role-participant agent and non-role participant agent, to delegation using agent-based role delegation. Identified two additional modes in which these delegation can occur: static and dynamic. Used the dynamic non-role participant agent, manifestation to develop a model for agent-based role delegation. Models to describe the other manifestations can be similarly developed, thus were briefly mentioned.

25 Questions ???