Department of Computer Science PCL: A Policy Combining Language EXAM: Environment for Xacml policy Analysis & Management Access Control Policy Combining.

Slides:



Advertisements
Similar presentations
Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
Advertisements

1 Using Blind Search and Formal Concepts for Binary Factor Analysis Aleš Keprt
1 Authorization XACML – a language for expressing policies and rules.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
CBio Meeting, March 2-3, 2006 CHISEL Group Dept of Computer Science University of Victoria, Canada Visualization of ontologies and data annotations.
Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013.
Approaches to generalization of XACML New challenges for access control 27 th April 2005 Tim Moses.
Authz work in GGF David Chadwick
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
SSP Re-hosting System Development: CLBM Overview and Module Recognition SSP Team Department of ECE Stevens Institute of Technology Presented by Hongbing.
Xyleme A Dynamic Warehouse for XML Data of the Web.
NaLIX: A Generic Natural Language Search Environment for XML Data Presented by: Erik Mathisen 02/12/2008.
Visual Web Information Extraction With Lixto Robert Baumgartner Sergio Flesca Georg Gottlob.
XEngine: A Fast and Scalable XACML Policy Evaluation Engine Fei Chen Dept. of Computer Science and Engineering Michigan State University Joint work with.
1 CS 430 / INFO 430 Information Retrieval Lecture 24 Usability 2.
Sangam: A Transformation Modeling Framework Kajal T. Claypool (U Mass Lowell) and Elke A. Rundensteiner (WPI)
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
XACML By Ganesh Godavari Craig Peltier. Information Sharing Information Sharing relates to the sharing of information between two or more entities. Entities.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Secure Data Storage and Retrieval in the Cloud Bhavani Thuraisingham,
Domain-Specific Software Engineering Alex Adamec.
Knowledge Science & Engineering Institute, Beijing Normal University, Analyzing Transcripts of Online Asynchronous.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML OASIS eXtensible Access Control Markup Language Steve Carmody July 10, 2003 Steve Carmody July 10, 2003.
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
Faculty of Informatics and Information Technologies Slovak University of Technology Personalized Navigation in the Semantic Web Michal Tvarožek Mentor:
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
James Cabral, David Webber, Farrukh Najmi, July 2012.
Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 13: Query Processing.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
Introduction to MDA (Model Driven Architecture) CYT.
Chapter 13 Query Processing Melissa Jamili CS 157B November 11, 2004.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Department of Computer Science Policy Management Elisa Bertino, Ninghui Li (Purdue U.) Anupam Joshi (UMBC) Ravi Sandhu (UTSA)
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
Faculty of Informatics and Information Technologies Slovak University of Technology Personalized Navigation in the Semantic Web Michal Tvarožek Mentor:
PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision.
1 GT XACML Authorization Rachana Ananthakrishnan Argonne National Laboratory.
Computer Science Systematic Testing and Verification of Security Policies Tao Xie Department of Computer Science North Carolina State University
____________________________ XML Access Control for Semantically Related XML Documents & A Role-Based Approach to Access Control For XML Databases BY Asheesh.
Lecture 1- Query Processing Advanced Databases Masood Niazi Torshiz Islamic Azad university- Mashhad Branch
XML Access Control Koukis Dimitris Padeleris Pashalis.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Computer Science 1 Detection of Multiple-Duty-Related Security Leakage in Access Control Policies JeeHyun Hwang 1, Tao Xie 1, and Vincent Hu 2 North Carolina.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
September XACML: Consistency analysis Luigi Logrippo Université du Québec University of Ottawa
11 Restricting key use with XACML* for access control * Zack’-a-mul.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
EMI INFSO-RI Argus The EMI Authorization Service Valery Tschopp (SWITCH) Argus Product Team.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Modeling Security-Relevant Data Semantics Xue Ying Chen Department of Computer Science.
OASIS e Xtensible Access Control Markup Language (XACML) Hal Lockhart
WonderWeb. Ontology Infrastructure for the Semantic Web. IST WP4: Ontology Engineering Heiner Stuckenschmidt, Michel Klein Vrije Universiteit.
1 Ontology based Policy Interoperability Dr. Latifur Khan Tahseen Al-Khateeb Mohammad Alam Mohammad Farhan Husain.
Access Control Policy Languages in XML Lê Anh Vũ Võ Thành Vinh
Design Evaluation Overview Introduction Model for Interface Design Evaluation Types of Evaluation –Conceptual Design –Usability –Learning Outcome.
UnifiedSec-1 CSE 5810 Integrated Secure Software Engr. Approach for Functional, Collaborative, and Information Concerns J. A. Pavlich-Mariscal, S. Berhe,
Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University Purdue University.
XACML and the Cloud.
Access Control What’s New?
Presentation transcript:

Department of Computer Science PCL: A Policy Combining Language EXAM: Environment for Xacml policy Analysis & Management Access Control Policy Combining & Comparison Elisa Bertino, Ninghui Li (Purdue University)

Department of Computer Science Why Policy Combining? A policy may contain multiple sub- policies. The effect of the whole policy is determined by combining the effects of sub-policies –Firewalls: first-applicable –XACML: deny-overrides, permit-overrides, first-applicable, only-one-applicable

Department of Computer Science Other Useful Combining Algorithms Weak-consensus: Strong-consensus: Weak-majority: Strong-majority:

Department of Computer Science Our Goal An expressive and practical language for specifying policy combining algorithms Our solution: PCL NINGHUI LI, ELISA BERTINO, QIHUA WANG, WAHBEH QADARJI Purdue University

Department of Computer Science Overview of PCL Uses four values: Σ = {P, D, NA, IN} Evaluation errors are represented by non-empty subsets of {P, D, NA, IN} –15 possible values Two ways to specify policy combining behavior –Using a Policy Combining Operator (PCO) –Using linear constraints

Department of Computer Science Policy Combining Operators Policy combining operator (PCO) –is a PCA that combines two policies (or rules) –g: Σ × Σ -> Σ, where Σ = {P, D, NA, IN} A PCO can be represented as a matrix P1 \ P2PDNAIN PPDPD DDDDD NAPD D INDDDD Deny-overrides P1 \ P2PDNAIN PPPPP DDDDD NAPD IN First-applicable

Department of Computer Science From PCO to PCA PCA should be a function Σ + -> Σ Given a PCO g, its recursive PCA is the function f: –f(P 1 ) = P 1 –f(P 1, P 2 ) = g(P 1, P 2 ) –f(P 1,…,P n ) = g(f(P 1,…,P n-1 ), P n ) DFA-representation of policy evaluation P D NA IN Any D, IN P, NA D, IN P NA Deny-overrides P D NA IN Any D P NA IN Any First-applicable

Department of Computer Science Using Linear Constraints PCOs cannot express counting-based strategies. Second approach for PCA specification uses linear constraints on the number of sub- policies that return P, D, NA, and IN. –A Linear Constraint is an expressions that uses #P, #D, #NA, #IN, addition/subtraction, comparisons, and AND  and OR 

Department of Computer Science Other Issues We Considered Optimized evaluation of PCAs Specify how to specify obligation- handling behavior in a PCA

Department of Computer Science Expressive Power: There are Examples for each numbered area

Department of Computer Science Using PCL in XACML An XACML Policy can include the PCA it wants to use A PDP that understands PCL can parse and understand all PCAs specified in it –makes deployment of new PCAs feasible

Department of Computer Science Implementation We implemented PCL and integrated it with Sun’s implementation for XACML 1.1 Changes and additions were made to several classes and the Result class in particular to account for errors in evaluation

Department of Computer Science EXAM Environment for Xacml policy Analysis & Management EXAM is a comprehensive environment for analyzing and managing XACML access control policies. It supports acquisition, editing and retrieval of policies in addition to policy similarity filtering, policy similarity analysis and policy integration. ELISA BERTINO, NINGHUI LI, GABRIEL GHINITA, PRATHIMA RAO Purdue University

Department of Computer Science EXAM Overview: Architecture Policy Repository Policy Similarity Filter Policy Similarity Analyzer Query Dispatcher User User Interface … User Policy Annotation Policy Integration Framework

Department of Computer Science Key Feature – Policy Similarity Analysis Goal –Characterize the relationships among the sets of requests respectively authorized by a set of policies. Two techniques –Policy Similarity Filter Less precise, faster (based on techniques from document matching techniques) –Policy Similarity Analyzer Precise, slower (based on MTDBB) A visualization environment has been developed to visualize policy similarity results

Department of Computer Science p3  p4  “DRILL-DOWN” Multi-level Grid Visualization of Policy Similarity Action Type

Department of Computer Science Policy Integration A Fine-grained Integration Algebra (FIA) –3-valued (Permit, Deny, NotApplicable) –Specify behavior at the granularity of requests and effects –Restrict domain of applicability –Support expressive policy languages like XACML Framework for specifying integration constraints and generating integrated policies. –MTBDD based implementation of FIA –Generation of integrated policy in XACML syntax.

Department of Computer Science Fine-grained Integration Algebra (FIA) Vocabulary of attribute names and domains Policy constants Permit policy Deny policy Binary operators Addition Intersection Unary operators Negation Domain Projection

Department of Computer Science FIA - Theoretical Results Expressivity –FIA can express all XACML policy combining algorithms –FIA can express policy “jumps” –FIA can model closed policies and open policies Completeness –A completeness notion has been developed, based on the concept of policy combination matrix, and FIA is complete with respect to such notion Minimality –Identification of the minimal complete subsets of the FIA operators

Department of Computer Science Current Status of EXAM A prototype has been completed that includes the similarity filter and analyzer The visualization tool has been completed We expect to release EXAM to the project team in December 2009

Department of Computer Science On-Going Work Study the specification and analysis of stateful policies in a practical way –e.g., by extending XACML User experimental study – the goal is to assess whether the similarity filter is a good predictor for policy similarity as perceived by users Extend EXAM with tools for synonym and dictionary management, and ontologies Develop tools for collaborative privacy-preserving policy enforcement