Protection Models Yeong-Tay Timothy Sun September 27, 2011 1Dennis Kafura – CS5204 – Operating Systems.

Slides:



Advertisements
Similar presentations
1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
Advertisements

A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Access Control Methodologies
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Access Control Intro, DAC and MAC System Security.
Bilkent University Department of Computer Engineering
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
Security-Enhanced Linux Joseph A LaConte CS 522 December 8, 2004.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
User Domain Policies.
Controlling Collaborative Systems -Srinivas Krishnan Dept of Computer Science UNC-Chapel Hill.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Chapter 14: Protection.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Protection and Security An overview of basic principles CS5204 – Operating Systems1.
Present by Napasakorn Sukjay Poom Samaharn
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Protection.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Operating Systems. Definition An operating system is a collection of programs that manage the resources of the system, and provides a interface between.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
TOOL5100: CSCL Issues in CSCW and groupware A. Mørch, Issues in CSCW and Groupware: Anders Mørch TOOL 5100,
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Access Control in Collaborative Systems William Tolone, Gail-Joon Ahn, Tanusree Pai & Seng-Phil Hong.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Presented by: Dr. Munam Ali Shah
Computer Security: Principles and Practice
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Protection and Security
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Chapter 14: Protection.
Computer Science Department
Protection and Security
Chapter 14: Protection.
Access Control What’s New?
Presentation transcript:

Protection Models Yeong-Tay Timothy Sun September 27, Dennis Kafura – CS5204 – Operating Systems

Agenda What is Protection (and why do we need it?) A Simple Message Passing System Collaborative Access Control Models  Access Matrix  Role-Based Access Control (RBAC)  Task-Based Access Control (TBAC)  Team-Based Access Control (TBAC)  Bell-LaPadula  Lock and Key  Spatial Access Control (SPACE)  Context-Aware Access Control Conclusion 2

What is Protection? Protection governs access to shared system assets Unsolicited access may be malicious or simply unintentional Having different protections in different system contexts is a core concept

A Simple Message Passing System Primitive Message System consists of isolated processes Processes encapsulate their own collection of objects Inter-process communication consists of passing message back and forth; message IDs cannot be forged Communication protocols become complicated when multiple processes are involved Cannot force a process to do anything, or to destroy it

Implications for Access Control Models? Should be applied and enforced at a distributed level Should be generic and configurable (expressive) Should support both fine and coarse granularity Should be usable (transparent = good) Should be easy to summarize (manageable) Should support dynamic policies Should perform reasonably (scalable)

Collaborative Access Control Models (Access Matrix) Object system has a subject-object relationship Different domains have different access rights

Access Matrix (2)

Access Matrix (3) Both implementations (ACLs, C-Lists) have disadvantages, dynamic changes to access rights not well-supported Difficult to adapt to more complex schemes (competency, least privilege, etc.) without additional system context Ownership may be subject to other system constraints

Role-Based Access Control Permissions assigned to roles rather than individual users A role models a job function Users can be assigned from one role to another

Role-Based Access Control (2) Early implementations not dynamic in their assignment of roles, did not account for context (passive vs. active) Early implementations did not support role assignments to specific object instances

Task-Based Access Control (TBAC) Domains contain task-based contextual information Access control changes dynamically w/ task progression Supports type-based, instance, usage-based access over RBAC

Task-Based Access Control (2) Context awareness remains tied to activities, tasks, workflow progression JIT permission assignments could lead to race conditions Mainly used to augment other access control models

Team-Based Access Control (TMAC, C-TMAC) Access rights associated with groups of users User context, object context Offers fine-grained control

Team-Based Access Control (2) Existing implementations are underdeveloped Lacks self-adminstration capabilities of models like access matrices Needs more context-awareness Suitability for certain tasks is unclear

Bell-LaPadula Intended to control the proliferation of data Uses access matrix for level clearance ★ Property – information can only become more secure, not less

Lock and Key Similar but different from C-List Involves Keys and Locks Keys can change hands Key doesn’t tell you capabilities it “unlocks” until it is used

Spatial Access Control (SAC) Transparent security mechanisms Access governed by credentials Does not allow for fine-grained control Difficult to apply

Context-Aware Access Control Extends RBAC w/ environmental roles Roles capture environment state Activated based on environment conditions Ubiquitous computing

Conclusion There are many things to consider when choosing a protection scheme for a system. No single protection model can address all of these issues but some excel at areas where others do not.