Computer Science 490.002 Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Management System
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Business Driven Technology Unit 2 Exploring Business Intelligence Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Medical Application Giant Squid Michal Cohen Robet Esho Chris Hogan Kate Kuleva Nisha Makwana Alex Rodrigues Rafal Urbanczyk.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
MDECA SECURITY UPDATES Update & Review for Security Changes!
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Module 4: Add Client Computers and Devices to the Network.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Hands-On Microsoft Windows Server 2008
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Chapter 1 Introduction to the Help Desk Introduction to Help Desk Concepts & Skills Mike Meyers’ Computer Skills.
Module 7: Fundamentals of Administering Windows Server 2008.
Web Site User Management Deborah Lee Soltesz USGS.
DCE (distributed computing environment) DCE (distributed computing environment)
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Storing Organizational Information - Databases
First in Service -Best in Banking Pavan Anna Shirish Nadella Maneeshpal Bandlamudi.
Chapter Two Clients and Servers: Who’s the Boss?.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Network Security & Accounting
Chapter 8: Aspect Oriented Programming Omar Meqdadi SE 3860 Lecture 8 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
TimeClock Plus UPDATES & ENHANCEMENTS. TCP Version 7 Beta version now being tested Compatible with Apple and mobile devices Different look and numerous.
EBSCOadmin Overview Tutorial support.ebsco.com. EBSCOadmin is a powerful administrative platform that offers a wealth of options for customizing your.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Next Steps Apply for Security Roles Where to get more Info Summer/Winter Hires.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Module 1: Introduction to Windows 2000 and Networking.
SharePoint and Active Directory Update March 18, 2010.
DocuShare Replacement with SharePoint and Active Directory
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
TEASE – FSP TASBO ANNUAL CONFERENCE 2015 FEBRUARY 18, 2015 AL JOHNSON, TEASE – FSP USER ADMINISTRATOR, STATE FUNDING.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Database and Cloud Security
Securing Network Servers
Information Security Professionals
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Multi-Factor Authentication
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Team Member: Xiaomin Dong
An introduction to DSpace
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Chapter 27: System Security
Employee Self Service An Introduction to Premier ESS.
Keeping Member Data Safe
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Use this presentation with Section 2 of the Deployment Workbook.
Welcome to Grant Tracker!
Presentation transcript:

Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a g e 1 By Jorge L. Ortega-Arjona And Eduardo B. Fernandez

The Problem How to address the handling of shared resources by multiple entities while maintaining the security of the shared resource. The Secure Blackboard pattern offers an enhanced version of the Shared Resource pattern with the addition of security features. S e c u r e B l a c k b o a r d P a t t e r n – P a g e 2 Similar to the use of semaphores and mutexes in systems programming, resources need to be protected not only from corruption and integrity challenges, but also from unauthorized or unprivileged access. For example, other students shouldn’t be able to access your COUGARNET account, but System Administrators would need access in certain situations (i.e. “I forgot my password.”)

The Secure Blackboard Pattern The Knowledge Source sends requests to the Control to perform an operation on the Blackboard. The Control handles these requests by first authenticating them using the Authenticator and Reference Monitor. S e c u r e B l a c k b o a r d P a t t e r n – P a g e 3 The Control performs these operations (read, update, etc.) in accordance with their Role and records the activity using the Secure Logger.

Real-World Application – Punch clock system The various staff (managers, employees, system admins) make requests via a Terminal or Workstation to read or update the Clock Database. Each staff member is allowed access to certain operations determined by their assigned Role (user, manager, or system admin). S e c u r e B l a c k b o a r d P a t t e r n – P a g e 4 The Control class handles these requests which first have to be authenticated and verified and finally logged.

S e c u r e B l a c k b o a r d P a t t e r n – P a g e 5 Real-World Application – Punch clock system Advantages No staff member is allowed to access the clock database without first going through the control class via a workstation or terminal. This means that every request made to access or update the clock must be authenticated and verified before it is performed. The clock database is kept secure by the introduction of roles. For example an employee cannot alter the time punches, only punch in and punch out, but a manager can make edits to the database. New role types can be added dynamically. For instance, a payroll type that can only read the database and not make updates.

Pattern Analysis The Secure Blackboard Pattern becomes invaluable as networked computing environments continue to rise. With the advent of distributed computing, cloud computing, and the increase of reliance on databases the need for data security and the means for determining different access privileges is crucial. S e c u r e B l a c k b o a r d P a t t e r n – P a g e 6 The Secure Blackboard pattern provides a repeatable solution for a shared resource that can be accessed by multiple entities whom can be added dynamically with varying levels of access as determined by their roles.