CSIIR Workshop March 14-15, 20051 Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
News in XACML 3.0 and application to the cloud Erik Rissanen, Axiomatics
The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM (0) {mkamel, benzekri, barrere, nasser}
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Understanding Active Directory
Identity Federation in Healthcare Networks Xiaohui Chen Department of Computer Science University of Virginia.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Chapter 9 Database Design
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Understanding Active Directory
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Database Design - Lecture 1
Computer Science 5204 Operating Systems Fall, 2011 Dr. Dennis Kafura Course Overview 1.
Chapter 5 Network Security
Sponsored by the National Science Foundation Enabling Trusted Federation Marshall Brinn, GENI Program Office October 1, 2014.
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Protection Models Yeong-Tay Timothy Sun September 27, Dennis Kafura – CS5204 – Operating Systems.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Database Administration
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010.
Privacy rules over JPEG images Jaime Delgado DMAG UPC BarcelonaTECH October 2015.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Computer Science 5204 Operating Systems Fall, 2012 Dr. Dennis Kafura Course Overview 1.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Presented By: Smriti Bhatt
Institute for Cyber Security
Cloud Security– an overview Keke Chen
Security Requirements for ChinaGrid Applications - What the current grid security solutions cannot do Hai Jin Huazhong University of Science and Technology.
Software Security II Karl Lieberherr.
Institute for Cyber Security
XACML and the Cloud.
Similarities between Grid-enabled Medical and Engineering Applications
ESA Single Sign On (SSO) and Federated Identity Management
Identity Infrastructure Fundamentals and Key Capabilities
O. Otenko PERMIS Project Salford University © 2002
How to Mitigate the Consequences What are the Countermeasures?
Computer Science and Engineering
Groups and Permissions
Assured Information Sharing
CS703 - Advanced Operating Systems
Access Control What’s New?
Presentation transcript:

CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth Security Information Center Fermi National Accelerator Laboratory IBM

CSIIR Workshop March 14-15, Organization  Grand Challenges –Problems –Requirements  PRIMA – a privilege-based approach –Models –Architecture/Mechanisms  Research challenges –Policy –Obligations –Enforcement –Usability  Relationship to I3P and Workshop Themes

CSIIR Workshop March 14-15, Grand Challenge Problems  Societal infrastructures “Develop tools and principles that allow construction of large-scale systems for important societal applications that are highly trustworthy despite being attractive targets.”  Dynamic, pervasive computing environments “For the dynamic, pervasive computing environments of the future, give computing end-users security they can understand and privacy they can control. From: CRA Workshop on “Grand Research Challenges in Information Security and Assurance,” November 2003.

CSIIR Workshop March 14-15, Cyber Infrastructure Requirements Grand ChallengeAttributeRequirement Societal infrastructures large scale distributed authority distributed trust establishment trustworthy predictable responsive to environment Dynamic, pervasive computing environments understandable familiar paradigm unified principle controllable restricted rights assignment differential confidence

CSIIR Workshop March 14-15, PRIMA Models

CSIIR Workshop March 14-15, PRIMA Properties Grand Challenge AttributeRequirementPRIMA Model Property Societal infrastructure large scale distributed authority PM: privilege creation and delegation distributed trust establishment TM: user-centric trust PM: direct privilege management trustworthy predictableAM/PM: dynamic policy responsive to environment AM: adaptive policy Dynamic, pervasive computing environments understandable familiar paradigmPM: privilege concept unified principlePM: privilege concept controllable restricted rights assignment PM: least privilege access differential confidence TM: incremental trust PM: selective control of privileges

CSIIR Workshop March 14-15, Privilege Structure Privilege Properties  Fully associated  Directly applicable  Time limited  Externalized  Secure  Non-repudiation Implementation  Container: X.509 Attribute Certificate  Privilege: XACML rule construct

CSIIR Workshop March 14-15, Enforcement Concepts  Policy Enforcement Point (PEP) checks privileges for: –Applicability (to resource and requestor) –Validity (of time frame and signature) –Authority (with respect to privilege management policy)  All permissible privilege constitute a dynamic policy for a request  Policy Decision Point (PDP): –Makes coarse decision –Adds obligations for PEP

CSIIR Workshop March 14-15, Dynamic Policy

CSIIR Workshop March 14-15, Obligations  Additional constraints to an authorization decision  If PEP cannot fulfill an obligation then it disallows access  Obligation address the mismatch in level of detail between request and policies  Obligations help in maintaining system state

CSIIR Workshop March 14-15, Research Challenges: Policy  What can be adapted from software engineering research for policy: –Testing –Debugging –Formal Analysis –Requirements engineering  Policy extensions –Threat/environment aware

CSIIR Workshop March 14-15, Research Challenges: Obligations  Granularity mismatch –Too many rights to be externalized –Partially addressed by dynamic policy  With respect to the request –Need to add restrictions finer-grained than request

CSIIR Workshop March 14-15, Research Challenges: Enforcement  Evaluation of mechanisms –Dynamic user accounts –Virtual machine/sandboxing –Service containers  Model –Distributing privileges to dynamically provision an execution environment, vs. –Pre-provisioning an execution environment and distributing a privilege for it

CSIIR Workshop March 14-15, Research Challenges: Usability  What are the right conceptual models? –Privileges –Roles –Others? Several? Combinations?  How can users manage their rights? –P3P –Shibboleth release policies –Least-privilege control

CSIIR Workshop March 14-15, Addressing I3P and Workshop Themes Enterprise Security Management Policy definition and management Trust among Distributed Autonomous Parties PRIMA trust model Least privilege access Fully decentralized mechanisms Discovery/Analysis of Security Properties and Vulnerabilities Policy testing Policy analysis using formal methods Secure System and Network Response and Recovery Threat-aware policies Traceback, Identification, and Forensics Privilege validation (signing, non-repudiation) Obligations Insider ThreatsSeparation of duties through privilege restrictions Life-cycle ThreatsPolicy requirements engineering Distributed Ad Hoc Trust/Multi-Level Trust Privilege management Secure execution environments I3P Agenda Workshop Themes