A Role-Based Delegation Model and some extensions By: Ezedin S.Barka Ravi Sandhu George Mason University.

Slides:



Advertisements
Similar presentations
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advanced Piloting Cruise Plot.
1 Framework for Role-Based Delegation Models (RBDMs) By: Ezedin S.Barka and Ravi Sandhu Laboratory Of Information Security Technology George Mason University.
FRAMEWORK FOR AGENT-BASED ROLE DELEGATION Presentation by: Ezedin S. Barka UAE University.
ARBAC99 (Model for Administration of Roles)
Ravi Sandhu Venkata Bhamidipati
ARBAC 97 (ADMINISTRATIVE RBAC)
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
ISA 662 RBAC-MAC-DAC Prof. Ravi Sandhu. 2 © Ravi Sandhu RBAC96 ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERSPERMISSIONS... SESSIONS ROLE.
© 2005 Ravi Sandhu Access Control Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 1 Embedded Computing.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ZMQS ZMQS
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
ABC Technology Project
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
VOORBLAD.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
0 Teams: Roles of Group Members. 1 What is a team? Two or more people ……….
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
1..
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Lecture plan Outline of DB design process Entity-relationship model
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12 View Design and Integration.
A SMALL TRUTH TO MAKE LIFE 100%
PSSA Preparation.
Immunobiology: The Immune System in Health & Disease Sixth Edition
CpSc 3220 Designing a Database
Traktor- og motorlære Kapitel 1 1 Kopiering forbudt.
Presentation transcript:

A Role-Based Delegation Model and some extensions By: Ezedin S.Barka Ravi Sandhu George Mason University

7 What is delegation? The basic idea behind delegation is that some active entity in a system delegates authority to another active entity to carry out some function on behalf of the former

8 Forms of delegation Delegation in computer systems can take many forms: –human to machine –machine to machine –human to human – perhaps even machine to human Our focus is on the Human to Human ( where we consider the ability of a user who is a member of a role to delegate his role to another user who belong to another role).

9 RBAC96 is the base for our work We used the Role-Based Access Control Model, developed by Sandhu, as our framework

10 The RBAC96 Model

11 Role-based delegation model-Flat roles (RBDM0) Assumptions &basic elements –Delegation between members in the same role is not allowed because it is meaningless. –delegation addressed in this model is a one step delegation –The delegation is total –Each delegating role r has two types of members, Original members Users_O(r), and Delegated members Users_D(r)

12 RBDM0 Has the following components: –UAO U R many to may original member to role assignment relation –UAD U R, many to may delegated member to role assignment relation –UA = UAO UAD –UAO UAD Original members and delegated members in the same role are disjoint

13 RBDM0.. Cont. –User_O(r) = {U|(U,r) UAO} – User_D(r) = {U|(U,r) UAD} –User_O(r) User_D(r) in a role get all the permissions assigned to that role –Note that O(r) D(r) because UAO UAD –T is a set of duration –Delegate roles: UAD T is a function mapping each delegation to a single duration

14 RBDM0.. Cont. Role-to-role delegation is authorized by means of can-delegate relation: can delegate R R. For example, Chairman Role Professor Role Alice User_O(Prof.)Bob User_O(Chair) Alice delegates to Bob (Bob,Prof.) UAD

15 RBDM0.. Cont.. Revocation in RBDM0 –Revocation using timeout Simple & self triggering Not enough, damage can happen within the duration –Grant dependent revocation gives the power to the original members No need to to define a can-revoke relation

16 Extensions We started by developing a very simple delegation model, RBDM-FR We are moving toward developing more complex models by evolving the simple models to include some extensions such as: Hierarchical roles,Muti-step delegation, …etc.

17 Extensions Cont.. Extensions of RBDM0 include: –Delegation in hierarchical roles –Multi-step delegation –There are two types of permissions Delegable and Non-delegable permissions –Grant-dependent revocation

18 Extensions Cont. Delegation in hierarchical roles –senior roles inherit the permissions of roles that are junior to them –adds more complications, because in hierarchical roles there are three possible ways for doing delegation Upward delegation Downward delegation Cross sectional delegation

19 Example of delegation in hierarchical roles Prof. RA TASecretary Delegation is upward

20 RBDM-HR Has the following components: –RH R R is partially ordered role hierarchy ( this can be written as in infix notation) –UAOE U R is many to many original explicit members to role assignment relation –UADE U R is many to many delegate explicit member to role assignment relation –UAO I U R is many to many original implicit member to role assignment

21 RBDM-HR.. Cont.. –UAD I U R is many to many delegate implicit member to role assignment relation –UA = UAOE UADE –UAOE UADE = original explicit members and delegate explicit members in the same role are disjoint –All members, Users_OE( r ) Users_OI( r ) Users_DE(r) Users_DI(r) in a role get all the permissions assigned to that role

22 RBDM-HR.. Cont... –Note that ( r r) [User_OE(r ) User_DE( r) = ] because UAOE UADE = –In RBDM-HR the semantics are defined such that there is a strict precedent among these two combinations as following: –User_OE(r) User_OI (r) User_DE(r) User_ DI (r) –Delegate member: UADE UADI T is a function mapping each explicit or explicit delegate membership in a role to a single duration

23 RBDM-HR.. Cont... Role-to-role delegation is authorized by means of can-delegate relation: R can delegate R 2

24 Multi-step delegation allows the delegated role memberships to be further delegated to other roles The RBDM0 will have the following components: –U, R, P are sets of users, roles, and permissions –UA U R is many to many user to role assignment relation –UAO U R –UAD U R –UADD U R –UA = UAO UAD UADD –UAO (UAD UADD) = –Users: R 2 U is a function mapping each role r to a set of users

25 Multi-step delegation. Cont. The RBDM0 will have the following components: –Users(r) = {U (U, r) UA} –Users_O(r) = {U (U, r) UAO} –Users_D(r) = {U (U, r) UAD} –Users_DD(r) = {U (U, r) UADD} Note that user_O(r) user_D(r) DD_(r) = because UAO UAD UADD =

26 Types of Permissions (delegable and non-delegable) –Will not have any impact on the delegation or revocation, because the only relevant element to delegation and revocation is the human –It adds an extra control on what can and can not be delegated.

27 Grant-dependent revocation only the delegating member is allowed to revoke the role he delegated –Pros: -It makes the process of revocation more controllable -It eliminates conflict between the original members -Cons: -have to keep track of who the sponsoring role is in order to do revocation -If the sponsoring role gets revoked from the sponsoring user, then we have to deal with issue of what to do with its delegated roles and how

28 Summary Described the motivation, intuition and outline of a new simple and a non-trivial model for user to user delegation using roles called RBDM (role- based delegation model) Identified and discussed a list of some possible directions by which this model can be extended, this list including, delegation in hierarchical roles, multiple-step delegation, types of permissions,and grant- dependent revocation.