Information Assurance: A Personal Perspective

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Cyber-Identity, Authority and Trust in an Uncertain World
© Ravi Sandhu The Secure Information Sharing Problem and Solution Approaches Ravi Sandhu Professor of Information Security and Assurance.
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
1 PEI Models towards Scalable, Usable and High-assurance Information Sharing Ram Krishnan Laboratory for Information Security Technology George Mason University.
© 2004 Ravi Sandhu The Schematic Protection Model (SPM) Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Title Slide EVOLVING CRITERIA FOR INFORMATION SECURITY PRODUCTS Ravi Sandhu George Mason University Fairfax, Virginia USA.
© Ravi Sandhu Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology.
© 2004 Ravi Sandhu The Safety Problem in Access Control HRU Model Ravi Sandhu Laboratory for Information Security Technology George Mason.
© 2004 Ravi Sandhu A Perspective on Graphs and Access Control Models Ravi Sandhu Laboratory for Information Security Technology George.
Attribute Mutability in Usage Control July 26, 2004, IFIP WG11.3 Jaehong Park, University of Maryland University College Xinwen Zhang, George Mason University.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
1 Safety Analysis of Usage Control (UCON) Authorization Model Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce George Mason University AsiaCCS.
ISA 662 Internet Security Protocols Kerberos Prof. Ravi Sandhu.
Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
Institute for Cyber Security
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
LECTURE 1 ACCESS CONTROL Ravi Sandhu.
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
© Ravi Sandhu HRU and TAM Ravi Sandhu Laboratory for Information Security Technology George Mason University
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
© 2004 Ravi Sandhu The Typed Access Matrix Model (TAM) and Augmented TAM (ATAM) Ravi Sandhu Laboratory for Information Security Technology.
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
OM-AM and RBAC Ravi Sandhu * Laboratory for Information Security Technology (LIST) George Mason University.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Information Systems Today: Managing in the Digital World
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Public Thomas Mejtoft Exjobbsredovisning Teknisk fysik, Umeå universitet
Kerberos and X.509 Fourth Edition by William Stallings
Slide 14-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 5 14 Protection and Security.
© 2012 National Heart Foundation of Australia. Slide 2.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
Chapter 13 The Data Warehouse
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Past, Present and Future
Institute for Cyber Security
OM-AM and RBAC Ravi Sandhu*
ASCAA Principles for Next-Generation Role-Based Access Control
Cyber Security Research: A Personal Perspective
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

Information Assurance: A Personal Perspective Ravi Sandhu www.list.gmu.edu

Agenda Selected highlights from my 25+ years in this business (roughly chronological wrt start) Typed Access Matrix (TAM) Model Multilevel Relational (MLR) Model Role-Based Access Control (RBAC) Policy-Enforcement-Implementation (PEI) Layers Usage Control (UCON) Model TriCipher Authentication Ladder Selected ongoing research projects Assured Information Sharing Enabled by Trusted Computing Perspective on the future of Information Assurance Q&A

Safety in Access Control: Access Matrix Model (Lampson, 1971) Objects (and Subjects) F G r w own S u b j e c t s U r r w own V rights

Safety in Access Control: HRU Model (1976) Theorem 1. Safety in HRU is undecidable Theorem 2. Safety in monotonic mono-operational HRU is undecidable

Safety in Access Control: TAM Model (Sandhu, 1992) Theorem 1. Safety in TAM is undecidable Theorem 2. Safety in monotonic acyclic ternary TAM is polynomially decidable

Safety in Access Control: From HRU to TAM HRU (HRU 1976) Take-Grant (JLS 1978) SSR (Sandhu 1983) SPM (Sandhu 1988) ESPM (Ammann-Sandhu, 1990) TAM (Sandhu, 1992)

The Multilevel Relational (MLR) Model: Taming Polyinstantiation (1998)

The Multilevel Relational (MLR) Model: Taming Polyinstantiation (1998)

The Multilevel Relational (MLR) Model: Taming Polyinstantiation (1998)

Role-Based Access Control: RBAC96 Model (1996) Theorem. RBAC can be configured to enforce Lattice-Based Access Control (or Bell-LaPadula), and Discretionary Access Control

Role-Based Access Control: The NIST/ANSI Standard Model (2004)

Policy-Enforcement-Implementation (PEI) Layers (2000 onwards) What? How? Objectives Policy Model Enforcement Model Implementation Model Implementation

PEI and RBAC What? How? Policy Neutral RBAC96, NIST/ANSI04, ARBAC97, Delegation, etc. User-Pull, Server-Pull Digital Certificates, Cookies, Tickets, SAML assertions etc. Implementation

PEI and RBAC: Server-Pull Enforcement Client Server User-role Authorization Server

PEI and RBAC: User-Pull Enforcement Client Server User-role Authorization Server

Usage Control The UCON Model (2002 onwards) unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes

TriCipher Authentication Ladder: Functional View

TriCipher Authentication Ladder: Underlying Science 2-key RSA Private key: d (used to sign) Public key: e (used to verify signature) 3-key RSA Net effect: as though single private key d was used to sign, BUT Private key: d1 (used by user to partially sign) Private key: d2 (used by TACS server to partially signature)

TriCipher Authentication Ladder: Underlying Science e * d = 1 mod phi(n) d1 * d2 = d mod phi(n) Stored on TACS server and used to partially sign on behalf of authenticated user Constructed on client PC from multiple factors under control of user password random string 1 random string 2 …

Assured Information Sharing Enabled by Trusted Computing (Ongoing work) Secure Information Sharing (IS) “Share but Protect” “Mother of all Security Problems” Policy-Enforcement- Implementation Layers (PEI) & Usage Control Models (UCON) Trusted Computing (TC)

What is Trusted Computing (TC)? Basic premise Software alone cannot provide an adequate foundation for trust Old style Trusted Computing (1970 – 1990’s) Multics system Capability-based computers Intel 432 vis a vis Intel 8086 Trust with security kernel based on military-style security labels Orange Book: eliminate trust from applications What’s new (2000’s) Hardware and cryptography-based root of trust Trust within a platform Trust across platforms Rely on trust in applications No Trojan Horses or Mitigate Trojan Horses and bugs by legal and reputational recourse Massive paradigm shift Prevent information leakage by binding information to Trusted Viewers on the client

What is Information Sharing? The mother of all security problems Share but protect Requires controls on the client Server-side controls do not scale to high assurance Bigger than (but includes) Retail DRM (Digital Rights Management) Enterprise DRM

What is Information Sharing? Strength of Enforcement Content type and value Weak Medium Strong Sensitive and proprietary Password-protected documents Software-based client controls for documents Hardware based trusted viewers, displays and inputs Revenue driven IEEE, ACM digital libraries protected by server access controls DRM-enabled media players such as for digital music and eBooks Dongle-based copy protection, hardware based trusted viewers, displays and inputs Sensitive and revenue Analyst and business reports protected by server access controls Roshan Thomas and Ravi Sandhu, “Towards a Multi-Dimensional Characterization of Dissemination Control.” POLICY04.

With current state of knowledge the information sharing space Functionality Strength of enforcement Simple Complex Weak/Medium Strong Legally enforceable versus system enforced rights. Reliance on legal enforcement; Limited system enforced controls. Strong system- enforceable rights, revocable rights. Dissemination chains and flexibility. Limited to one-step disseminations. Flexible, multi-step, and multi-point. Mostly legal enforcement; System enforceable controls. Object types supported. Simple, read-only and single-version objects. Support for complex, multi-version objects. Support for object sensitivity/confidentiality. Reliance on legally enforceable rights. System supported and enforceable rights and sanitization on multiple versions. Persistence and modifiability of rights and licenses. Immutable, persistent and viral on all disseminated copies. Not viral and modifiable by recipient. System enforceable. Online versus offline access and persistent client-side copies No offline access and no client-side copies. Allows offline access to client-side copies. Few unprotected copies are tolerated. No unprotected copies are tolerated. Usage controls Control of basic dissemination. Flexible, rule-based usage controls on instances. Some usage abuse allowed. No potential for usage abuse. Preservation of attribution. Recipient has legal obligation to give attribution to disseminator. System-enabled preservation and trace- back of the attribution chain back to original disseminator. Attribution can only be legally enforced. Attribution is system enforced. Revocation Simple explicit revocations. Complex policy-based revocation. No timeliness guarantees. Guaranteed to take immediate effect. Support for derived and value-added objects. Not supported. Supported. System enforceable rights for derived and valued-added objects. Integrity protection for disseminated objects. Out of band or non-crypto based validation. Cryptographic schemes for integrity validation. Off-line validation. High-assurance cryptographic validation. Audit Audit support for basic dissemination operations. Additional support for the audit of instance usage. Offline audit analysis. Real-time audit analysis and alerts. Payment Simple payment schemes (if any). Multiple pricing models and payment schemes including resale. Tolerance of some revenue loss. No revenue loss; Objective is to maximize revenue. With current state of knowledge the information sharing space is too complex to characterize in a comprehensive manner Look for sweet spots that are of practical interest and where progress (and killer products) can be made Roshan Thomas and Ravi Sandhu, “Towards a Multi-Dimensional Characterization of Dissemination Control.” POLICY04.

Classic Approaches to Information Sharing Discretionary Access Control (DAC), Lampson 1971 Fundamentally broken Controls access to the original but not to copies (or extracts) Mandatory Access Control (MAC), Bell-LaPadula 1971 Solves the problem for coarse-grained sharing Thorny issues of covert channels, inference, aggregation remain but can be confronted Does not scale to fine-grained sharing Super-exponential explosion of security labels is impractical Fallback to DAC for fine-grained control (as per the Orange Book) is pointless Originator Control (ORCON), Graubart 1989 Propagated access control lists: let copying happen but propagate ACLs to copies (or extracts) Not very successful

Modern Approach to Information Sharing Prevent leakage by binding information to Trusted Viewers on the client Use a mix of cryptographic and access control techniques Cryptography and Trusted Computing primitives enable encapsulation of content in a Trusted Viewer Trusted Viewer cannot see plaintext unless it has the correct keys Access control enables fine-grained control and flexible policy enforcement by the Trusted Viewer Trusted Viewer will not display plaintext (even though it can) unless policy requirements are met Enables policy flexibility and policy-mechanism separation

PEI Models Framework for Information Sharing

The Future: Three Megatrends Fundamental changes in Cyber-security goals Cyber-security threats Cyber-security technology

Cyber-security goals are changing USAGE purpose USAGE INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure

Cyber-security attacks are changing The professionals have moved in Hacking for fun and fame Hacking for cash, espionage and sabotage

Cyber-security technology is changing Trusted computing on the client Virtualization Massive parallelism on the desktop Computation-and-power challenged mobile devices etcetera

Cyber-Identity, Authority and Trust Systems Overall Goal (Functional View) Identity People Machines Secure Easy Affordable Authority Trust Organizations Technical Means (Structural View) “Business” Means (Process View) Business Models Legal, Social Regulations Reputational Risk, Liability Privacy Cost Recourse etc RBAC (Role-Based Access Control) Info Sharing UCON (Usage Control) PKI (Public-Key Infrastructure) TM (Trust Management) TC (Trusted Computing) TONs (Trusted Overlay Networks) DPM (Distributed Policy ETC (……………) DRM (Digital Rights SA (Situational Awareness) PEI Layered Models

Information Assurance: A Personal Perspective Ravi Sandhu www.list.gmu.edu Q&A