Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Access Control and Policy Management Speaker: John Mitchell.

Slides:



Advertisements
Similar presentations
0 McLean, VA August 8, 2006 SOA, Semantics and Security.
Advertisements

The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Operating System Security
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Lecture 23 Internet Authentication Applications
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
8.2 Discretionary Access Control Models Weiling Li.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Trust Management I Anupam Datta Fall A: Foundations of Security and Privacy.
Trust Management II Anupam Datta Fall A: Foundations of Security and Privacy.
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Using First-order Logic to Reason about Policies Vicky Weissman Joint work with: Joseph Halpern and Carl Lagoze.
A Formal Foundation for ODRL What’s ODRL?  An XML-based language for writing software licenses. Language specification includes:  syntax  English interpretation.
Policy Languages and Enforcement John Mitchell Stanford 4 th IAPP Privacy Summit February 2004.
Access Policy John Mitchell Stanford University. Research directions uProblem Access policy: specification and enforcement uApproach Tractable subsets.
Rights management Vicky Weissman
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Trust Management: Access policy and deduction John Mitchell.
1 Role-Based Cascaded Delegation: A Decentralized Delegation Model for Roles Roberto Tamassia Danfeng Yao William H. Winsborough Brown University Brown.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
CS590U Access Control: Theory and Practice Lecture 21 (April 11) Distributed Credential Chain Discovery in Trust Management.
Digital Object Architecture
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
An XML based Security Assertion Markup Language
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
Kemal Baykal Rasim Ismayilov
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Main Theme: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Introduction to Active Directory
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Enable Semantic Interoperability for Decision Support and Risk Management Presented by Dr. David Li Key Contributors: Dr. Ruixin Yang and Dr. John Qu.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Decentralized Access Control: Policy Languages and Logics
Building Enterprise Applications Using Visual Studio®
Building Trustworthy Semantic Webs
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Beyond Proof-of-compliance: Security Analysis in Trust Management
Presentation transcript:

Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Access Control and Policy Management Speaker: John Mitchell (Stanford)

SPYCE Objective: Scalable Distributed Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Incentives, Privacy, and Anonymity Protocol Design and Analysis Trust Management Network Architecture Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s

Traction tProblem - Access policy: specification and enforcement tApproach - Tractable subsets of first-order logic tAccomplishments - Policy languages, algorithms, demo applications tTransitions to Industry - Collaboration, start-up, students to industry, industrial visitor to Stanford tFuture - Interface w/commercial approaches: XrML, EPAL, P3P - Policy development environment: algorithms, tools Present activity: Cornell, Stanford Past contributors: Penn, Yale

Policy at site A may govern resources at site B Protect distributed resources with distributed policy Distributed Access Control Policy Resource Policy Resource Policy Resource ID

Diffuse Computing Goals tFlexible and scalable access control for loosely-coupled, diffuse systems - Resource sharing  coalitions, multi-centric collaborative systems  grid computing - Personal Privacy  Protect suborganization’s input to diffuse system  Example: patient’s hospital records - Organizational Privacy  Protect institution’s assets from suborganizations  Example: coalition assets from coalition partners

Decentralized Policy Example AliceEPub StateU is a university Alice is a student Grants access to university students Trusts universities to certify students Trusts ABU to certify universities StateU ABU

Merging Policy Sets tCOTS information-sharing framework - Uses industry-standard policy P ind tMilitary wants to run COTS application, - Wants military policies P mil tMust detect and resolve conflicts - Integrate P ind and P mil

Enterprise Access Control Policy Who What When Where Who What When Where User Right Resource Constraint Joecan openfinancials.xls using wired SSL on his laptop Resource Why

Plan Analyze Enforce Measure Improve Policy Management Lifecycle

Policy Language and Deduction tSpecification - State policy succinctly and directly - Confident that policy captures intention tEnforcement - Deduction, proof of compliance tManage policy lifecycle - Policy development tools - Safety and availability analysis Core Issue

SPYCE Approach tTractable subsets of first-order logic - Datalog  If-then patterns without function symbols or negation  Standard database query formalism - Constraint Datalog  Constraints based on constraint domains  Hierarchies, intervals, discrete sets - Polarity-restricted FOL (“Lithium”)  Allows function symbols, negation  Supports modular combination of policies

General policy form tA policy statement has the form:  x 1,…,  x m (Condition  (  ) Permitted(principal, privilege)) where - Condition is a conjunction of literals; - principal is individual [HW] or group [LM] - privilege can be action [HW] or group [LM] Yale Feigenbaum, Li Cornell Halpern, Weissman Stanford Li, Mitchell, …

Role-based Trust-management (RT) RT 0 : Decentralized Roles RT 1 : Parameterized Roles RT T : for Separation of Duties RT D : for Selective Use of Role memberships RT 2 : Logical Objects RT T and RT D can be used (either together or separately) with any of the five base languages: RT 0, RT 1, RT 2, RT 1 C, and RT 2 C RT 1 C : structured resources RT 2 C : structured resources [Li, Mitchell, Winsborough, …]

Recall example AliceEPub StateU is a university Alice is a student Grants access to university students Trusts universities to certify students Trusts ABU to certify universities StateU ABU

Example RT 0 credentials 1.StateU.stuID  Alice 2.ABU.accredited  StateU 3.EPub.university  ABU.accredited 4.EPub.student  EPub.university.stuID 5.EPub.access  EPub.student Together, five statements prove Alice is entitled to access

Policy Diffusion Alice EPub StateU ABU ABU.accredited  StateU COE.stuID  Alice EPub.university  ABU.accredited EPub.student  EPub.university.stuID StateU.stuID  COE.stuID COE

Datalog As A Foundation tNatural - Security policy statements are if-then rules tPrecise - Declarative and widely-understood semantics tTractable - No function symbols  tractability - Efficient goal-directed evaluation procedures tAvailable technology - Extensive Datalog research in LP and DB

Better: Constraint Datalog tWhy constraints: - Datalog cannot easily express permissions about structured resources and ranges tWhat is Constraint Datalog - Special form of CLP; query language for Constraint DB tA Constraint Datalog rule: - R 0 (x 0 ) :- R 1 (x 1 ),..., R n (x n ),  (x 0, x 1, …, x n )  x 0, x 1, …, x n are tuples of variables  is a constraint in all the variables

Example Policy with Constraints tA grants to B the permission to - connect to hosts in the domain “stanford.edu” - at port 80, - valid from time t 1 to t 3, and - allows B to further delegate grantConnect(A, B, h, p, v) :- h   edu,stanford , p=80, v  [t 1, t 3 ] grantConnect(A, x, h, p, v) :- grantConnect(B, x, h, p, v), h   edu,stanford , p=80, v  [t 1, t 3 ]

Useful Constraint Domains tTree domains: - Path expressions  a1,a2, ,ak   E.g.,  pub,software  for /pub/software - Primitive constraint: x=y or x   a1, ,ak , where   {=, <, , ,  } tRange domains: - Primitives: x=y, x=c, or, x  (c1, c2) tDiscrete domains with finite sets: - Primitive constraint: x=y, x  {c1,c2, ,cj}

RT Accomplishments tRT language design tRT deduction, trust negotiation - Fast distributed deduction, constraints tComparative analysis: KeyNote, SPKI 2.0 tSafety and availability analysis - HRU undecidability => RT poly-time, NP, Pspace tSample applications - August scheduling, UStorIt file sharing, ATN, … tTransitions - IBM privacy, InnerPresence, NTT DoCoMo, Hitachi

Complementary Approach tRT starts with a tractable fragment of first-order logic (Datalog) and extends it t[HW] start with an intractable language (first-order logic) and restricts it Result: [HW] can capture policies that forbid actions expressed using functions

Sample policies tMany policies explicitly forbid actions - `Smoking is prohibited in the dining areas of all restaurants seating more than 35 people’ NYC Smoke-Free Air Act - `The tickets may not be refunded’ is a policy of many theaters, special airline fares, … tFunctions are also useful  x 1 (Absent(x 1 ) => Permitted(Spouse(x 1 ), SpeakFor(x 1 ))) tExpressive: [HW] not easily expressed in RT tTractable: [HW] fragment decidable in poly time [Halpern, Weissman]

Multiple Policy Sets tBecause [HW] supports prohibitions, can detect conflicts between policies tE.g: detect conflicts between P ind and P mil - Find actions permitted, forbidden in P ind  P mil - Requires language that express prohibitions  If the policy language assumes any action that is not explicitly permitted is forbidden, then P ind and P mil conflict, unless they’re identical

Policy Combination Denied Permitted Denied Permitted Denied = + OK Denied Permitted Denied Permitted Denied = + ??

A Formal Foundation for XrML tXrML: a language for writing software licenses. - Very popular: to be supported by Microsoft, +++ tSpecification gives syntax, informal semantics, + algorithm to determine if a permission follows from a set of licenses. tWhat we’ve done: - Provided formal semantics for XrML - Found bugs in their algorithm - Proved their queries are NP-hard and - Found tractable fragments of XrML. tInteracting with XrML standards committee Current Work See Vicky’s poster for more details !

Critical Infrastructure Protection tMany critical infrastructures, national and DoD-specific, are decentralized tData sharing essential for operation, but data compromise can be catastrophic tResearch Question: How to share data safely, using policies that are easy to formulate, enforce, maintain tApproach: diffuse trust management

Assuring Software Quality tTechnology applicable to managing process interaction - Process A delegates rights to process B  For limited purpose, limited time, limited locations - Fine-grained control of process actions - Works for diffuse systems that escape normal controls imposed by localized OSs tDiffuse principle of least privilege

DoD Impact tDynamic coalitions - Partial sharing based on partial trust tJoint Vision 2010 / Joint Vision 2020 of “Network Centric” operations - Can use policy to push data, overcome network bandwidth limitations - Right data to right place at right time

Plans for Option tApplications and Transitions - Work with XrML developers on language and algorithm - IBM Privacy Project  Use RT algorithms for EPAL, P3P applications - Pursue commercial and DOD applications - Application to large policy sets (social security policies) tGeneralize results: RT  Datalog  PFOL tImprove implementation: RT 0  Datalog  PFOL tPolicy development environment and tools - User interface, XML-format, interoperability - Testing methodology, analysis methods

Architecture design for policy-based portal site Portal site Web service invoke service return results(customized by General Policy) User Service Provider access Authentication Authority Attribute Authority(A) Bob’s Policy(A) -Bob.Address <- CA -Bob.Job <- Student … General Policy -Discount <- Student … Web service Attribute Authority(B) Policy Decision Authority Bob’s Policy(B) -Bob.MembershipPoint <- high … invoke service return results(customized by Bob’s Policy(B)) Attribute Assertion Authentication Assertion Bob’s Policy(A) -Bob.Address <- CA -Bob.Job <- Student … federated ID User doesn’t have a federated ID User has a federated ID Role-based Trust Management (TM) language (SOAP) (SAML) UDDI Registry register discover create (UDDI) Policy Decision Authority Attribute Authority(B) Attribute Authority(A) Authentication Authority Credential Chains (Liberty Alliance) Hitachi

Secure service infrastructure for heterogeneous overlay networks  Communication  Cooperation  Incentives  Delivery “Diffusion”

Automated Trust Negotiation tCredentials may contain sensitive information - need protection just as other resources - deduction must be interactive tThe Trust Target Graph (TTG) protocol - supports RT 0, which has delegation - supports distributed discovery of statements - supports Ack policies, which also protects against unauthorized leakage of attribute information tCryptographic protocols for ATN - Oblivious Signature-Based Envelope (OSBE)

Safety and Availability Analysis tOrganizations delegate partial control - What happens if other organizations change policy in the future without my knowledge? tGiven policy P and restriction R on changes - Simple safety: Is A.r  {D} possible?  PTIME - Simple availability: Is A.r  {D} necessary?  PTIME - Bounded safety: Is {D1, …, Dn}  A.r necessary?  PTIME

Complexity of Containment Analysis tGiven P and R, is A.r  B.r1 necessary? - Simple delegation  PTIME  Uses logic programs with stratified negation - Intersection  coNP-complete  Equivalent to determining validity in propositional logic - Linking  PSPACE-complete  Equivalent to containment of languages accepted by NFA - Linking+Intersection  decidable in coNEXP  Exact complexity unknown Decidability, PTIME stand in contrast to the HRU model, in which simple safety is undecidable

Implementation Status tJava inference engine for RT 0 tPreliminary version of RTML - an XML-based Encoding of RT statements - XML Schemas and parser exist tApplications - U-STOR-IT: Web-based file storage and sharing - August: A Distributed Calendar Program - Automated Trust Negotiation Demo by NAI - TNT Trust Negotiation architecture at BYU

NEED TO UPDATE Future SPYCE Directions tAccomplishments - Framework and logic for policy definition - Algorithms for policy enforcement - Some experience with capturing practical policy requirements from a variety of applications tChallenges - Continue implementation and deployment efforts - Policy development algorithms and tools  Debugging and testing, safety and availability analysis - Additional challenges  Policy privacy, Automated trust negotiation, Revocation

Sample Applications tAugust Distributed Calendar tUSTORIT tSocial security database - policy to qualify for social security tLibrary policy - Have to administer copyright - Who is allowed to access course notes? tXrML - Commercial license and rights framework

August: Distributed Calendar tUsers define groups, maybe interdependent tEach user has a calendar and can specify policy which determines - who is allowed to view each part of the user's calendar - who is allowed to add an activity of a certain kinds at a certain time

U-STOR-IT: Web-based sharing tUser auth: SSL and X.509 certificates tUsers define interdependent groups tLocker - Hierarchical folder of heterogeneous files - Locker/file upload/access policy set by owner tPolicies translated into RT tImplement w/Java Servlets and MySQL

IBM collaboration, Startup