PolicyMorph: Interactive Policy Model Transformations for a Logical ABAC Framework Michael LeMay Omid Fatemieh Carl A. Gunter.

Slides:



Advertisements
Similar presentations
Complex Organizational System A Complex System Model for Organizations, Companies and Social Actions.
Advertisements

The design process IACT 403 IACT 931 CSCI 324 Human Computer Interface Lecturer:Gene Awyzio Room:3.117 Phone:
Alternate Software Development Methodologies
Illinois Security Lab Using Attribute-Based Access Control to Enable Attribute- Based Messaging Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter.
Leveraging Enterprise Library in Your Applications Keith Elder Quicken Loans Manager, Sr. Software Engineer Microsoft MVP Keith a t keithelder dot net.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
1 SWE Introduction to Software Engineering Lecture 5.
APPLICATION DEVELOPMENT BY SYED ADNAN ALI.
Feb. 23, 2004CS WPI1 CS 509 Design of Software Systems Lecture #5 Monday, Feb. 23, 2004.
Vijayalakshmi Atluri MSIS Department and CIMIC Rutgers University - USA Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.
Chapter 2: IS Building Blocks Objectives
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
[ §4 : 1 ] 4. Requirements Processes II Overview 4.1Fundamentals 4.2Elicitation 4.3Specification 4.4Verification 4.5Validation Software Requirements Specification.
Business Rules INFS 770 – KM for E-Business Professor L. Kerschberg Spring 2004.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
The design process z Software engineering and the design process for interactive systems z Standards and guidelines as design rules z Usability engineering.
Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
Business Processes and Workflow How to go from idea to implementation
The Software Development Life Cycle: An Overview
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Database Design - Lecture 1
1 Secure Distributed Objects for Grid Applications Laurent Baduel, Arnaud Contes, Denis Caromel OASIS team ProActive
Using Mathematica for modeling, simulation and property checking of hardware systems Ghiath AL SAMMANE VDS group : Verification & Modeling of Digital systems.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
A Z Approach in Validating ORA-SS Data Models Scott Uk-Jin Lee Jing Sun Gillian Dobbie Yuan Fang Li.
Feasibility Study.
Requirements Elicitation. Who are the stakeholders in determining system requirements, and how does their viewpoint influence the process? How are non-technical.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Chapter 10 Information Systems Analysis and Design
HCI in Software Process Material from Authors of Human Computer Interaction Alan Dix, et al.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Requirements Engineering ments_analysis.
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
Illinois Security Lab Privacy Sensitive Location Information Systems in Smart Buildings Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Midwest Security Workshop,
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
Traffic Management Transit Management Emergency Management Fixed Point-to-Fixed Point Communications Roadway Toll Administration Remote Traveler Support.
Extending context models for privacy in pervasive computing environments Jadwiga Indulska The School of Information Technology and Electrical Engineering,
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 Information System Building Blocks.
2-1 A Federation of Information Systems. 2-2 Information System Applications.
Computer Science 1 Detection of Multiple-Duty-Related Security Leakage in Access Control Policies JeeHyun Hwang 1, Tao Xie 1, and Vincent Hu 2 North Carolina.
Workforce Scheduling Release 5.0 for Windows Implementation Overview OWS Development Team.
Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010.
Requirements Engineering ments_analysis.
Prof. Hany H. Ammar, CSEE, WVU, and
Professional Ethics and Responsibilities
Comparison of The Workflow Management Systems Bizagi, ProcessMaker, and Joget Mohamed Zeinelabdeen Abdelgader [1], Omer Salih Dawood [2], Mohamed Elhafiz.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Requirements Analysis Requirements Engineering (CI 2323) Daniel Siahaan.
BIS 220 MASTER Leading through innovation/bis220masterdotcom.
The Components of Information Systems
ENTERPRISE MODELLING KSI 1404
Institute for Cyber Security
HCI in the software process
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
Business Rule Based Configuration Management and Software System Implementation Using Decision Tables Olegas Vasilecas, Aidas Smaizys VGTU, Vilnius, Lithuania.
The Components of Information Systems
Autonomous Aggregate Data Analytics in Untrusted Cloud
Securing Home IoT Environments with Attribute-Based Access Control
HCI in the software process
HCI in the software process
Automated Analysis and Code Generation for Domain-Specific Models
On Parametric Obligation Policies: Enabling Privacy-aware Information Lifecycle Management in Enterprises IEEE Policy Workshop 2007 Marco Casassa Mont.
Information System Building Blocks
Presentation transcript:

PolicyMorph: Interactive Policy Model Transformations for a Logical ABAC Framework Michael LeMay Omid Fatemieh Carl A. Gunter

Outline Motivation Introduction Logical Attribute-Based Policies Logical Constraints Access Control Models Model Transformations Prototype Implementation and Test Case Conclusion 2

Motivation Difficult or impossible for policy administrator to formally encode all desired policy constraints: All Possible Policy Models Models Accepted by Formal Constraints Models Desired by Administrator 3

Motivation: Example Consider: Access control policy for Personally-Identifiable Information (PII) contained in online retailer’s database –Regulated by retailer’s privacy policy: “maintain confidentiality of customer information from third party partners and marketing” Assume some employees employed in both information systems support and marketing departments –Such an employee could be responsible for customer list –Privacy policy prohibits this separation of duty violation, and constraint checker detects violation. 4

Motivation: Example (cont.) Task must be assigned to some other employee Constraint checker unaware of external considerations essential to task reassignment, such as existing workloads of employees, relevant skills, etc. Policy model administration tool presents administrator a list of possible employees to which task could be reassigned, and administrator selects most suitable option. 5

Introduction Model transformation tool for logical attribute-based policies Uses first-order logical constraints to detect bad model configurations Suggests possible model transformations to bring model into conformance Evaluates effects of transformations 6

Access Control Architecture Logical Attribute-Based Access Control (ABAC) Policy Access Control Model Subjects Objects Attributes Attribute Assn. Actions Context 7

Logical Attribute-Based Policies Order-sorted first-order logic: –S: subjects (σ) –O: objects (δ) –Entities: supersort of S and O (ε) –Actions: performed by subjects upon objects (η) –Contexts: runtime information incorporated into decisions (γ) –Justifications: compound terms specifying every reason a positive access decision was made (κ) 8

Policy Models 5-tuple: –A: sort containing attributes – : reflexive, transitive, anti- symmetric relation defining attribute hierarchy: : – : associates attributes with entities 9

Major Concepts Policies: Contexts: Justifications: –Set of Reasons: –Set of rule names 10

Sample Justification Reasons 11 AmberCurtiss TA(CS423) RA Possible reasons in justifications: HasAttr(TA(CS423)) HasSubAttr(TA) IsNamed(Amber) HasAttr(RA) NotHasSubAttr(TA) IsNamed(Curtiss) NotIsNamed(Amber)

Logical Constraints Signature: –f : any first-order formula –κ: justification specifying why constraint has been violated 12

Model Transformations Generated from constraint justifications to bring model into conformance: 13

Transformation Animations 14 AmberCurtiss TA(CS423) RA EliminationIntroductionEgress TransferIngress Transfer

Transformation Suggestions Framework “suggests” possible transformations based on reasons in justifications from constraints: 15

Transformation Suggestions (cont.) 16

Sample Suggestions 17 Curtiss RA Possible suggestions for reasons: HasAttr(Curtiss, RA) => Eliminate(Curtiss, RA) NotHasSubAttr(TA) => Introduce(Curtiss, TA(CS423))

Prototype Implementation SWI-Prolog access control engine Text-mode interactive model validation and transformation tool 18

Model Validation Tool 19

Test Case Scenario #1 TA separation of duty enforcement Constraint: It should never be true that any TA shares a TA room with another TA from one of the courses in which the first TA is enrolled. Model: –408 subjects –172 objects –Similar to CS department at UIUC 20

Constraint Encoding 21

Constraint Violations Sample: Curtiss and Amber are assigned to the same TA room, and Amber is Curtiss’ TA! 22

Scenario Curtiss Amber Course: CS523Course: CS461 Room 4023 TA Student TA room 23

Suggested Solutions remove ta(cs461) from the subject curtiss transfer ta(cs461) to amber transfer ta(cs461) to corwin transfer ta(cs461) to alice... remove student(cs523) from the subject curtiss transfer student(cs523) to alice... remove ta(cs523) from the subject amber transfer ta(cs523) to curtiss transfer ta(cs523) to corwin transfer ta(cs523) to alice … remove ta_room(cs523) from the object room(rm4023) transfer ta_room(cs523) to room(rm4001) transfer ta_room(cs523) to room(rm4002)... remove ta_room(cs461) from the object room(rm4023) transfer ta_room(cs461) to room(rm4001) transfer ta_room(cs461) to room(rm4002)... 24

Scenario Curtiss Amber Course: CS523Course: CS461 Room 4023 TA Student TA room Room 4001 TA room 25

Prototype Interface with Janus Uses Prolog foreign-language interface to allow a Java Building Automation System (BAS) simulator (Janus) to use the Prolog Access Decision Function (ADF), as a test case Complete system and demo video available at

Test Case System Architecture 27

Selected Related Works Fisler, K., Krishnamurthi, S., Meyerovich, L. A., and Tschantz, M. C Verification and change-impact analysis of access-control policies. In Proceedings of the 27 th international Conference on Software Engineering (ICSE ‘05). 28

Selected Related Works (cont.) Boyer, J. P., Tan, K., and Gunter, C. A Privacy Sensitive Location Information Systems in Smart Buildings, In Proceedings of the 3 rd International Conference on Security in Pervasive Computing (SPC ‘06). 29

Conclusion PolicyMorph leverages an administrator’s human knowledge to select a desirable policy model from among all those that satisfy a set of constraints 30

Questions? Contact info: Project webpage: Thank you! 31