Visualization of Automated Trust Negotiation Danfeng Yao Michael Shin Danfeng Yao Michael Shin Brown University Goldman Sachs Inc. Brown University Goldman.

Slides:



Advertisements
Similar presentations
Automatic Trust Negotiation 1Dennis Kafura – CS5204 – Operating Systems.
Advertisements

1 Distributed Deadlock Fall DS Deadlock Topics Prevention –Too expensive in time and network traffic in a distributed system Avoidance.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Lesson 17: Configuring Security Policies
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
Chapter 12 Network Security.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Privacy-Preserving Trust Negotiations Mikhail Atallah Department of Computer Science Purdue University.
Abstract Source Ontology Viewing and Editing Gary Yngve Jim Brinkley Dan Cook Linda Shapiro asking for data sending data Request Handler Cache Modifications.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Using Digital Credentials On The World-Wide Web M. Winslett.
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
The Traust Authorization Service A. Lee, M. Winslett, J. Basney, and V. Welch University of Illinois at Urbana-Champaign Goal: A scalable.
WP4 Security Update For WP4: David Groep
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Homeland Security Exercise and Evaluation Program HSEEP.
Understanding Active Directory
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
DIVA. What Is Diva ? Diva is a software infrastructure for visualizing and interacting with dynamic information spaces. Visualizations are built by hooking.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
1 Point-Based Trust: Define How Much Privacy is Worth Danfeng YaoKeith B. Frikken Brown UniversityMiami University Mikhail J. Atallah Roberto Tamassia.
Automatic Trust Negotiation Presented by: Scott Hackman 1Scott Hackman – CS5204 – Operating Systems.
Cryptography and Network Security
Zhonghua Qu and Ovidiu Daescu December 24, 2009 University of Texas at Dallas.
1 Role-Based Cascaded Delegation: A Decentralized Delegation Model for Roles Roberto Tamassia Danfeng Yao William H. Winsborough Brown University Brown.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
GUI For A Virtual Pipeline Simulation Testbed By, Revathi Manni Ranganathan Major Professor: Dr.Virgil Wallentine.
Web Security : Secure Socket Layer Secure Electronic Transaction.
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Swing MVC Application Layering A Layer is a collection of components that Perform similar tasks. Perform similar tasks. Isolate implementation details.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Trust-X: A Peer-to-Peer Framework for Trust Establishment Elisa Bertino, et.al. Presented by: Carlos Caicedo.
Accredited DomainKeys: A Service Architecture for Improved Validation Accredited DomainKeys: A Service Architecture for Improved Validation.
22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester /04/2004 Daniel Olmedilla L3S / University.
Internet Architecture and Governance
1 Secure Group Collaboration in an Open Environment May, 2006 Zhengyi Le DEVLAB, Dartmouth College.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
DEAS2005Michael Shin Copyright1 Connector-Based Self-Healing Mechanism for Components of a Reliable System Michael E. Shin Department of Computer Science.
Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Company LOGO User Authentication Threat Modelling from User and Social Perspective “Defending the Weakest Link: Intrusion.
Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
LonWorks Introduction Hwayoung Chae.
Canadian Bioinformatics Workshops
Online Performance Analysis and Visualization of Large-Scale Parallel Applications Kai Li, Allen D. Malony, Sameer Shende, Robert Bell Performance Research.
Wednesday NI Vision Sessions
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Advanced Client/Server Authentication in TLS
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
World-Leading Research with Real-World Impact!
Concept Visualization for Ontologies of Learning Agents
WP4 Security Update For WP4: David Groep
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Protecting Privacy During On-line Trust Negotiation
Cryptography and Network Security
Presentation transcript:

Visualization of Automated Trust Negotiation Danfeng Yao Michael Shin Danfeng Yao Michael Shin Brown University Goldman Sachs Inc. Brown University Goldman Sachs Inc. Roberto Tamassia William H. Winsborough Roberto Tamassia William H. Winsborough Brown University University of Texas, San Antonio Brown University University of Texas, San Antonio Supported in part by NSF grants CCF– , IIS– , CNS– and CNS

Overview Introduction to two-party automated trust negotiation (ATN) Introduction to two-party automated trust negotiation (ATN) –Trust target graph (TTG) Design of the visualization framework Design of the visualization framework –Prototype implementation Example of a visualization session Example of a visualization session –Demo of our visualization program

Monitoring the release of sensitive credentials Accessing protected resources requires releasing digital credentials Accessing protected resources requires releasing digital credentials Credentials may be sensitive Credentials may be sensitive –Need to control the release of digital credentials –Trust Negotiation is an incremental, bilateral exchange of credentials and policies between resource owner and requester Visualization of automated trust negotiation – –Gives teaching and learning support for ATN users – –Enables users to visually examine the ATN process – –The combination of interactive visualization and ATN improves the security of protected resources –We demonstrate that Grappa and GraphViz (AT&T) are suitable graph drawing systems for visualizing ATN

A simple trust negotiation example Request for discount Request UID Request BBB Send BBB Send UID Grant the discount Policy Releasing UID requires BBB Cred.UID (student ID) AlicePolicy Discount requires UID Cred. BBB (better business bureau)

A general trust negotiation Protocol Request for resource Request credential Sensitive, request proof Sensitive, request more credential Send credential Grant the resource Policies Credentials AlicePolicies Credentials Send proof Primary trust target

Trust target graph Trust target graph (TTG) is a directed graph representing the state of negotiation [Winsborough Li ’02] Trust target graph (TTG) is a directed graph representing the state of negotiation [Winsborough Li ’02] – –The negotiation succeeds when the primary trust target is satisfied – –Fails when the primary target cannot be satisfied, or when neither negotiator changes the graph – –TTG can have cycles and be non-planar Construction of TTG Construction of TTG –Each negotiator keeps a local copy of TTG –Nodes are trust targets: The state of a node: unknown, satisified, or unsatisfied The state of a node: unknown, satisified, or unsatisfied –Edges represent implication and control relationships Satisfied states propagate along the edges Satisfied states propagate along the edges –Negotiators take turns extending the TTG by adding new edges and nodes to the current graph At the beginning TTG contains only the primary trust target At the beginning TTG contains only the primary trust target The new TTG is a supergraph of the previous one The new TTG is a supergraph of the previous one Associated credentials or policies are transmitted Associated credentials or policies are transmitted

TTG construction of the example Amazon: Amazon.discount ? Alice Amazon: Univ.Student ? Alice Alice: BBB.member ? Amazon Alice: Amazon ? Amazon Alice: BBB.member ? AmazonAmazon: Univ.Student ? AliceAmazon: Amazon.discount ? Alice

Components of our ATN visualization framework

Prototype implementation The visualizer displays the construction of TTG for negotiators The visualizer displays the construction of TTG for negotiators Uses Grappa system [Barghouti, Mocenigo, Lee. GD ‘97], a Java port of GraphViz system [Ellson, Gansner, Koutsofios, North, Woodhull et al] for graph drawing – –Layout provided by dot in GraphViz – –The upward drawing heuristics and hierarchical (layered) drawing features are suitable for drawing directed graphs such as TTGs – –Layout algorithms try to avoid edge crossings and reduce edge length Colors and shapes of nodes and edges represent different types in TTG and can be customized Displays local credentials, remote credentials, and policies

Standard target Intersection target Trivial target Linked role target

Edge types Edge nameColorMeaning ImplicationPurple A parent node implies the child node Linking monitorBlue Form a target with a linked role to a linking goal Linking solutionGold From a linked goal to a standard target Linking implicationGreen From a target with a linked role to a linked role target ControlSiennaUsed with ack and access policies IntersectionOrange From an intersection target to standard targets

Demo of a visualization session Requester: Alice Requester: Alice –Works at purchase department in Medix Fund (MedixFund.purchasingA) –She considers this credential sensitive Resource owner: Medical Supply Company (MedSup) Resource owner: Medical Supply Company (MedSup) –A member of ReliefNet (ReliefNet.member) Requested resource: Discount from MedSup Requested resource: Discount from MedSup –MedSup.discount Delegation credentials transfer privileges between roles Delegation credentials transfer privileges between roles –Role provisioner at ReliefNet is delegated to MedixFund.purchasingA –cPartner at Medix Fund is delegated to ReliefNet.member –Discount is given to provisioner at ReliefNet

ATN-Vis Demo

Example -- Start Requester: AliceProvider: Medical Supply (MedSup)

Example -- 3% progress

Example -- 16% progress

Example -- 19% progress

Example -- 23% progress

Example -- 29% progress

Example -- 42% progress

Example -- 45% progress

Example -- 52% progress

Example -- 61% progress

Example -- 71% progress

Example -- 77% progress

Example -- 74% progress

Example -- 84% progress

Example -- 97% progress

Example % progress

Related Work Graph drawing systems Graph drawing systems – –Grappa [Barghouti, Mocenigo, Lee. GD ‘97] – –GraphViz [Ellson, Gansner, Koutsofios, North, Woodhull et al] Visualization of protocols – –[Hall, Moore, Pratt, Leslie. SIGCOMM Workshop ‘03] – –[Zhao, Mayo. ICEE ’02] – –[Koch, Parisi-Presicce. FASE ‘03] Trust negotiation Trust negotiation –[Winsborough, Seamons, Jones. DISCEX’00] –[Yu, Ma, Winslett. CCS’00] –[Winsborough, Li. POLICY ’02] –[Li, Du, Boneh ‘03] Combination of visualization and automated protocols –Anomaly detection [ ] –Anomaly detection [Teoh, Zhang, Tseng, Ma, Wu. VizSEC/DMSEC ‘04] –Mining –Mining geo-spatial datasets [Keim, Panse, Sips, North. CG ‘04]

Conclusions and future work We have described the architecture and data model of an interactive visualization framework for ATN We have described the architecture and data model of an interactive visualization framework for ATN We have presented a prototype of our ATN visualization framework We have presented a prototype of our ATN visualization framework Grappa and GraphViz are suitable tools for drawing trust target graphs in ATN Grappa and GraphViz are suitable tools for drawing trust target graphs in ATN For future work, we plan to bring more interactive components into the implementation For future work, we plan to bring more interactive components into the implementation –Provide more interactive explanations of texts inside TTG nodes –Visualization and modification of negotiation strategies