1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT June 21, 2012

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Institute for Cyber Security
A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
Fall 2010/Lecture 301 CS 426 (Fall 2010) Role Based Access Control.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
Past, Present and Future
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
The Future of Access Control: Attributes, Automation and Adaptation
On the Value of Access Control Models
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT June 21, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

 Dozens of models proposed and studied. Only three winners (meaningful practical traction)  DAC: Discretionary Access Control, 1970  MAC: Mandatory Access Control, 1970  RBAC: Role-Based Access Control, 1995  RBAC emerged at an inflection point due to dissatisfaction with the then dominant DAC and MAC  We are currently at another inflection point due to dissatisfaction with the now dominant RBAC  ABAC (Attribute-Based Access Control) has emerged as the prime candidate to be the next dominant paradigm © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Access Control Status

 NO!! Never!!  Is ABAC the right word for the moment?  Certainly a strong candidate  Already too late?  ReBAC (relationship-based access control) not ABAC  Big Data, Analytics and AI will take care of everything  ABAC is exponentially more complex than anything that has been an Access Control winner so far (DAC, MAC, RBAC)  We need the complexity, but need to manage it  If Google can index the web, we can do ABAC!! © Ravi Sandhu 3 World-Leading Research with Real-World Impact! ABAC = Final Word?

 Attributes are name:value pairs  possibly chained  Associated with  users  subjects  objects  contexts  device, connection, location, environment, system …  Converted by policies into rights just in time  policies specified by security architects  attributes maintained by security administrators  ordinary users morph into architects and administrators © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Attribute-Based Access Control (ABAC)

Rights to attributes  Rights  Labels  Roles  Attributes © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Authorization Leap Benefits  Decentralized  Dynamic  Contextual  Consolidated Risks  Complexity  Confusion  Attribute trust  Policy trust Maturation Chaos ??

 Cyber technologies and systems trends will drive pervasive adoption of ABAC  RBAC is simply not good enough  ABAC deployment is going to be messy but need not be chaotic  Researchers can facilitate ABAC adoption and reduce chaos by developing  Models  Theories  Systems © Ravi Sandhu 6 World-Leading Research with Real-World Impact! Prognosis

7 World-Leading Research with Real-World Impact! Authorization Challenges © Ravi Sandhu Policy Specification Policy Reality Policy Enforcement Policy Administration

 Analog Hole  Inference  Covert Channels  Side Channels  Spoofing  Attack Asymmetry  Compatibility  …. © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Policy Reality

© Ravi Sandhu 9 World-Leading Research with Real-World Impact! The RBAC Story RBAC96 paper Proposed Standard Adopted

© Ravi Sandhu 10 World-Leading Research with Real-World Impact! ABAC Status RBAC96 paper Proposed Standard Adopted ABAC still in pre/early phase 1990? 2012

11 World-Leading Research with Real-World Impact! RBAC Policy Configuration Points © Ravi Sandhu Constraints Role Hierarchy (RH)

12 World-Leading Research with Real-World Impact! RBAC Policy Configuration Points © Ravi Sandhu Constraints Role Hierarchy (RH) Security Architect Security Administrator User Security Architect Security Administrator Security Architect

13 World-Leading Research with Real-World Impact! RBAC Policy Configuration Points © Ravi Sandhu NIST model limits constraints to Static and Dynamic Separation of Duties

© Ravi Sandhu 14 World-Leading Research with Real-World Impact! ABAC Status RBAC96 paper Proposed Standard Adopted ABAC still in pre/early phase 1990? 2012

 X.509, SPKI Attribute Certificates (1999 onwards)  IETF RFCs and drafts  Tightly coupled with PKI (Public-Key Infrastructure)  XACML (2003 onwards)  OASIS standard  Narrowly focused on particular policy combination issues  Fails to accommodate the ANSI-NIST RBAC standard model  Fails to address user subject mapping  Usage Control or UCON (Park-Sandhu 2004)  Fails to address user subject mapping  Focus is on extended features  Mutable attributes  Continuous enforcement  Obligations  Conditions © Ravi Sandhu 15 World-Leading Research with Real-World Impact! ABAC Prior Work Includes

 Role granularity is not adequate leading to role explosion  Researchers have suggested several extensions such as parameterized privileges, role templates, parameterized roles (1997-)  Role design and engineering is difficult and expensive  Substantial research on role engineering top down or bottom up (1996-), and on role mining (2003-)  Assignment of users/permissions to roles is cumbersome  Researchers have investigated decentralized administration (1997-), attribute-based implicit user-role assignment (2002-), role-delegation (2000-), role-based trust management (2003-), attribute-based implicit permission-role assignment (2012-)  Adjustment based on local/global situational factors is difficult  Temporal (2001-) and spatial (2005-) extensions to RBAC proposed  RBAC does not offer an extension framework  Every shortcoming seems to need a custom extension  Can ABAC unify these extensions in a common open-ended framework? © Ravi Sandhu 16 World-Leading Research with Real-World Impact! RBAC Overall Assessment

17 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering

18 World-Leading Research with Real-World Impact! ABAC Research Agenda: RBAC Inspiration © Ravi Sandhu 1. Foundational Principles and Theory Principles: RBAC96 (1996), OM-AM (2000), NIST Standard (2000, 2004), PEI (2006), ASCAA (2008) Theory: ATAM Simulation (1999), LBAC-DAC Simulations (2000), Li-Tripunitara (2006), Stoller et al (2006, 2007), Jha et al (2008) 2. Core Models: RBAC96 (1996), ANSI- NIST Standard (2000, 2004) 3. Administrative Models: ARBAC97 (1997), RBDM (2000), RDM (2000), RB-RBAC (2002), ARBAC02 (2002), PBDM (2003) ARBAC07 (2007), SARBAC (2003, 2007) 4. Extended Models: TMAC (1997) Workflow (1999), T-RBAC (2000), OrBAC (2003), TRBAC (2001), RT (2003), GTRBAC (2005), GEO- RBAC (2005), P-RBAC (2007) 5. Policy Languages Constraints: RCL (2000), Jaeger-Tidswell (2001), Crampton (2003), ROWLBAC (2008) User-role assignment: RB-RBAC (2002), RT (2003) 6. Enforcement Architectures: Ferraiolo et al (1999), OM-AM (2000), Park et al (2001), xoRBAC (2001), RCC (2003), RB-GACA (2005), XACML Profiles (2004, 2005, 2006) 7. Design and Engineering: Role engineering: Coyne (1996), Thomsen et al (1999), Epstein-Sandhu (2001), Strembeck (2005) Role mining: Kuhlmann-Schimpf (2003), RoleMiner (2006, 2007), Minimal Perturbation (2008) NOTE: Only a small sampling of the RBAC literature is cited in this diagram

19 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering

20 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models Initial Results 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering

 Approach this challenge from several perspectives  Initial results on a bottom-up approach  ABACα model (DBSEC 2012)  Just sufficient to cover the core of DAC, MAC and RBAC  No extraneous features (however attractive and desirable)  ABACβ model (in progress)  Grow ABACα to accommodate additional models, including numerous RBAC extensions and RBAC-related models (e.g. RT) © Ravi Sandhu 21 World-Leading Research with Real-World Impact! ABAC Core Models

22 World-Leading Research with Real-World Impact! ABACα Requirements © Ravi Sandhu

23 World-Leading Research with Real-World Impact! ABACα Model Structure © Ravi Sandhu

24 World-Leading Research with Real-World Impact! ABACα Model Structure © Ravi Sandhu Policy Configuration Points

25 World-Leading Research with Real-World Impact! ABACα Basic Sets and Functions © Ravi Sandhu

 Administrative Functions  AddUser (u:NAME,uaset:UASET)  DeleteUser (u:NAME)  ModifyUserAtt (u:NAME,uaset:UASET)  System Functions  CreateSubject (u; s:NAME,saset:SASET)  DeleteSubject (u; s:NAME)  ModifySubjectAtt (u; s:NAME,saset:SASET)  Review Functions  UserAttributes (u:NAME)  UserOperationsOnObject (u,o: NAME)  AssignedUser(ua: NAME, value: Range(ua))  UserPermissions(u: NAME)  SubjectPermissions(s: NAME)  Policy Configuration Languages © Ravi Sandhu 26 World-Leading Research with Real-World Impact! ABACα Additional Components

27 World-Leading Research with Real-World Impact! ABACβ Model Structure © Ravi Sandhu Policy Configuration Points Same as ABACα Enrich other ABACα Components

28 World-Leading Research with Real-World Impact! ABACβ Examples © Ravi Sandhu [1]. MA Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. ACSAC, [2]. Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust management framework. IEEE S&P [3]. Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, TrustCol 2006

29 World-Leading Research with Real-World Impact! ABAC Research Agenda © Ravi Sandhu 1. Foundational Principles and Theory 2. Core ABAC Models Initial Results 3. Administrative ABAC Models 4. Extended ABAC Models 5. ABAC Policy Languages 6. ABAC Enforcement Architectures 7. ABAC Design and Engineering