1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.

Slides:



Advertisements
Similar presentations
Access Control CS461/ECE422 Fall Reading Material Chapter 4 through section 4.5 Chapters 23 and 24 – For the access control aspects of Unix and.
Advertisements

Information Flow and Covert Channels November, 2006.
Operating System Security
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Database Systems: Design, Implementation, and Management Tenth Edition
Access Control Chapter 3 Part 3 Pages 209 to 227.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Access Control Methodologies
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Access Control Intro, DAC and MAC System Security.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Chapter 2 Database Environment Pearson Education © 2014.
User Domain Policies.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez, Jan Jurjens, Nobukazu Yoshioka, and Hironori Washizaki.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Chapter 5 Network Security
G53SEC 1 Access Control principals, objects and their operations.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
Bayu Adhi Tama, M.T.I 1 © Pearson Education Limited 1995, 2005.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Policy, Models, and Trust
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Academic Year 2014 Spring Academic Year 2014 Spring.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
Chapter 2 Database Environment.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Data Modeling Using the Entity- Relationship (ER) Model
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
PROTECTION.
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Computer Data Security & Privacy
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment Pearson Education © 2009.
Database Environment Transparencies
OS Access Control Mauricio Sifontes.
CS703 - Advanced Operating Systems
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment Pearson Education © 2009.
Access Control What’s New?
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006

2 Overview Layers Pattern Authorization Pattern RBAC Pattern Multilevel Security Pattern File Authorization Pattern Discussion

3 An instance of the layers pattern

4 Authorization Pattern Context: -- Any computational environment where there are active entities that request resources whose access must be controlled. Problem: -- How to describe allowable types of accesses by active computational entities to passive resources(protected objects) Forces: -- The authorization structure must be independent of the type of resource; -- Predicates or guards may restrict the use of authorization according to specific conditions; -- some of the authorizations may be delegated by their holders to other subjects.

5 Authorization Pattern Solution:

6 Authorization Pattern solution

7 Authorization Pattern Consequences: -- applies to any type of resources -- The predicts in the rules are a general representation of any conditions that may restrict the application of a rule. -- the copy flag in the rules controls transfer of rights. -- Some systems separate administrative authorizations from user authorizations for further security. -- the request may not need to specify the exact object in the rule, the object may be implied by an existing protected object. Known uses -- Corresponds to the components of the access matrix, a fundamental security model. -- Basis for the access control systems of most commercial products. Related Patterns -- RBAC pattern -- file authorization pattern

8 RBAC Pattern Context: -- User should get rights based on their job functions. Problem: -- How to assign rights to users according to their roles in an institution. Forces: -- People have different needs for access to information; -- define precise access rights for its members according to a need-to-know policy; -- Granting rights to individual users would require storing many authorization rules and it would also be hard to keep track of these rules; -- User may have more than one role; may want to enforce policies such as separation of duty; -- a role may be assigned to individual users or to a groups of users;

9 RBAC Pattern: Solution:

10 RBAC Pattern

11 RBAC Pattern Consequences: -- reduce the complexity of security; -- Institution policies about job functions can be reflected directly in the definition of roles and the assignment of users to roles; -- Roles can be structured for further flexibility and reduction of rules; -- Users can activate more than one session at a time for functional flexibility -- can add UML constraints -- reducing the number of authorization rules and the number of role assignments. -- Additional conceptual complexity; Known Uses: -- Basis of most research papers and implementations of this idea. -- implemented in a variety of commercial systems Related Patterns: -- authorization pattern(simple version) -- Role pattern and the abstract Session.

12 Multilevel Security Pattern Context -- data and documents have sensitivity levels. Users have clearances and can access documents based on their clearances. Problem -- How to decide access in an environment with security classifications. Forces -- The model should protect the confidentiality and integrity of data based on its sensitivity. -- The model should be able to be used at any architectural level. -- There could be different sets of rules to decide access. -- There must be a convenient way to assign users and data to classification levels.

13 Multilevel Security Pattern Solution:

14 Multilevel Security Pattern Consequence -- The classification of users and data is relatively simple. -- can be proved to be secure under certain assumptions. -- Implementations should use labels in data to indicate their classification. -- additionally need trusted programs to assign users and data to levels. -- hard to do or impossible in commercial. Known uses -- has been used by several military-sponsored projects and in a few commercial products. Related Patterns -- the concept of roles can also be applied here, role classifications can replace user classifications.

15 File Authorization Pattern Context: -- The users of operating systems need to define files. These files can be accessed from different authorized workstations and access to the files should be restricted to authorized users. Forces: -- There may be different categories of subjects. -- Subjects may be authorized to access files, directories, and workstations. -- A subject has a home directory for each authorized workstation, but the same home directory can be shared among several workstation or among several subjects. -- Users may be grouped for access -- Some systems may use roles instead of in addition to users as subjects. -- There are different implementations for the file systems of operating system.

16 File Authorization Pattern Solution :

17 File Authorization Pattern Consequences: -- can accommodate a variety of subjects -- access objects can be single files, directories, recursive structures -- Implied authorization is possible. -- Implementations are not forced to follow the access matrix model. --Some systems may not use authorizations for workstations. -- Most operating systems use read/write/execute as access types. Higher level types of access are possible. -- In most operating systems there is the concept of owner, a special type of user with all rights on the files he creates. -- In some systems, files are mapped to the virtual memory address space. The pattern still applies to this case. Know Uses -- represents the file systems of Unix, Windows, Linx and most current operating systems. Related patterns -- Composite pattern -- RBAC pattern

18 General Discussion The actual implementation depends on the architectural level where they are applied. -- Access Control Lists -- the use of capabilities -- control access to classes -- the use of metaclasses and reflection Need to add more patterns in each level Other security models -- Clark-Wilson model -- Chinese Wall model