An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 7 th April 2007.

Slides:



Advertisements
Similar presentations
The Agribusiness Manager
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
A Foundation for System Security Invited talk at AISC 09 Clark Thomborson 21 February 2009.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Security Modelling: What is Security? for Tsinghua University Clark Thomborson 12 March 2010.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
SOFTWARE QUALITY ASSURANCE Maltepe University Faculty of Engineering SE 410.
TRAC / TDR ICPSR Trustworthy Digital Repositories.
Database Management System
Java Security: From HotJava to Netscape & Beyond Drew Dean, Edward W. Felten, Dan S. Wallach Department of Computer Science, Princeton University May,
Chapter 17 Controls and Security Measures
Information Security Policies and Standards
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
International Human Resources Management
Rethinking Construction Review of traditional construction models and a comparison of product development processes with other industries School of Architecture.
Workshop Ankara, –  Introduction  Legal background in Slovenia  Usage areas  Accreditations and supervision  REM service.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 8: Developing an Effective Ethics Program.
Corporate Ethics Compliance *
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
LOCAL GOVERNANCE IN THE 21 ST CENTURY: FRAUD, CORRUPTION AND ETHICS (THE UGANDA EXPERIENCE) PAPER PRESENTED AT TRAINING WORKSHOP HELD AT DOCKLANDS HOTEL.
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Ethics and Social Responsibility
Electronic Content Management (in a De-Perimeterised Environment) Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
SEC835 Database and Web application security Information Security Architecture.
Intranet, Extranet, Firewall. Intranet and Extranet.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 4 th April 2007.
Trusted Computing: Open, Closed, or Both? Computer Science Department Seminar Prof. Clark Thomborson 6 th April 2006.
Objective 5.02 Understand ethics and ethical decision-making.
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
FRAUD Students name: Professors name: Course: Date:
The Promise and Peril of Trusted Computing in Governmental Systems Presentation to the TRUST2008 Educational Event Prof. Clark Thomborson 4 th March 2008.
Copyright 2004 Prentice Hall1 Inside Stakeholders  Shareholders – the owners of the organization  Managers – the employees who are responsible for coordinating.
Designing Active Directory for Security
Marketing Ethics and Social Responsibility
MGT ORGANIZATIONAL BEHAVIOR Dr. K. A. S. P. Kaluarachchi Senior Lecturer Department of Management and Organization Studies Faculty of Management.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
1 Lecture 3: Conflict of Interest ( 利益衝突 ) Please refer to Chapter 5, “Ethics and the Conduct of Business” by John R. Boatright BBA 361 BBA 361 Business.
Public Administration Politics not politics What is the connection? Politics sets the tasks for administration. but should not manipulate it’s offices.
Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
IT Professionalism Ethics Modified by Andrew Poon.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Special Railways Phase III Proposed approach to regulatory changes Jakarta 16 May 2011.
Government Policy on Trusted Computing and Digital Rights Management a view from New Zealand Prof. Clark Thomborson 7 th April 2007.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Enterprise Content Management: Building a Collaborative Framework 32 nd Meeting of the Section of International Organizations, International Council on.
ON CORPORATE GOVERNANCE.  Ali Iqbal (Group leader) MBP  Nabeel Ahmad Butt MBP  Zain Fayyaz Butt MBP  Weheb Abid MBP  Amna.
How TPMs Can (and Should) Control Copyright Presentation to InternetNZ Copyright Workshop Prof. Clark Thomborson 13 th February 2007.
MANAGEMENT FUNCTIONS NOTES. WHAT IS THE ROLE & WORK OF A MANAGER?
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
AUTHORITY. Authority is the legal right to give orders and get order obeyed.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Developing Ethical Systems Barbara W. Scofield, PhD, CPA For Institute of Internal Auditors November 3,
A Foundation for System Security Clark Thomborson 5 August 2009 This presentation is based on “A Framework for System Security”, in Handbook of Computer.
Data protection—training materials [Name and details of speaker]
Corporate Governance Week 10 BUSN9229D Saib Dianati.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
OECD - Introduction It is an organisation of those countries which describe themselves as Democratic and have Market economy. Its HQ is in Paris, France.
Computer Security Security Concepts September 20, 2018
GDPR - Individual’s Rights
SRO APPROACH TO REGULATION
Towards a frictionless social security
Presentation transcript:

An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 7 th April 2007

TC/DRM 7 Apr 07 2 Outline An operational theory of trust. Hierarchies, bridges, and peerages. Problems of legitimation and enforcement. Desirable and feasible technical systems Enterprise Content Management (ECM): Emphasis should be on integrity and availability. Trusted Computing (TC): Emphasis should be on audit and assurance. Relationship Management: support for hierarchical, bridging, and peering trust with diverse systems and individuals. Why Digital Rights Managment (DRM) is a difficult security problem for its governors.

TC/DRM 7 Apr 07 3 Trust, Trustworthiness, and Privilege When someone chooses to use a non-assured system, they are accepting risk – and therefore they are trusting the system. Trustworthiness (an assurance) implies that trust (a risk-aware basis for a decision) is well-placed. Increasing our trust is our only way to cope with the increasing complexity of modern life. [Luhmann, Trust & Power, Wiley 1979] In security engineering, a trusted flow of information is one that might violate the security goals of the system (if a user or administrator makes an error). A privileged flow of information will not violate the security goals. In this respect, “privilege” is the opposite of “trust”. [O'Brien & Rogers, “Developing Applications on LOCK”, 1991]. Secure systems, if they are to do anything useful, must have trusted flows.

TC/DRM 7 Apr 07 4 Privilege and Trust in a Hierarchy Information flows upwards, toward the most powerful actor (at the root). Commands and trust flow downwards. The King is the most privileged. The peons are the most trusted. King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … Information flowing up is “privileged”. Information flowing down is “trusted”. Orange book TCSEC, e.g. LOCKix.

TC/DRM 7 Apr in a Hierarchy that has a Goal of Confidentiality Information flows upwards, toward the leading actor.  Actors can send to their superiors. Non-upwards traffic is trusted: not allowed by default; should be filtered, audited, … King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … up: “privileged” (allowed by default) down: “trusted” (disallowed by default, risking a loss of confidentiality) across: privileged & trusted routing

TC/DRM 7 Apr across Hierarchies Q: How should we handle between hierarchies? Company XAgency Y Answers:  Merge  Subsume  Bridge Merged X+Y Not often desirable or even feasible. Cryptography doesn’t protect X from Y, because the CEO/King of the merged company has the right to know all keys. Can an appropriate King(X+Y) be found?

TC/DRM 7 Apr across Hierarchies Q: How can we manage between hierarchies? Agency X Company Y Answers:  Merge  Subsume  Bridge

TC/DRM 7 Apr across Hierarchies Q: How can we manage between hierarchies? Company X Agency Y Answers:  Merge  Subsume  Bridge! Bridging connection: trusted in both directions.

TC/DRM 7 Apr 07 9 Bridging Trust We use “bridges” every time we send personal from our work computer. We build a bridge by constructing a “bridging persona”. Even Kings can form bridges. However Kings are most likely to use an actual person, e.g. their personal secretary, rather than a bridging persona. Agency X Hotmail Bridging connection: bidirectional trusted. Used for all communication among an actor’s personae. C should encrypt all hotmail to avoid revelations. C, acting as a governmental agent C, acting as a hotmail client

TC/DRM 7 Apr Personae, Actors, and Agents I use “actor” to refer to an agent (a human, or a computer program), pursuing a goal (risk vs. reward), subject to some constraints (social, technical, ethical, …) Actors can act on behalf of another actor: “agency”. In this part of the talk, we are considering agency relationships in a hierarchy. When an agent takes on a secondary goal, or accepts a secondary set of constraints, they create an actor with a new “persona”. Company X Hotmail C, acting as an employee C, acting as a hotmail client

TC/DRM 7 Apr Peerages Information flows upwards by default (“privileged”). Commands and trust flow downwards. Downward information flows are “trusted” (filtered, audited, etc.) Facilitator, Moderator, Democratic Leader, … Peers, Group members, Citizens of an ideal democracy, …

TC/DRM 7 Apr Peer trust vs. Hierarchical trust Trusting decisions in a peerage are made by peers, according to some fixed decision rule. There is no single root of peer trust. There are many possible decision rules, but simple majority and consensus are the most common. Weighted sums in a reputation scheme (e.g. eBay for goods, Poblano for documents) are a calculus of peer trust. “First come, first serve” (e.g. Wikipedia) is an appropriate decision rule, if the cost per serving is sufficiently low. The constitution of a peerage specifies its decision rule and its membership rules. Trusting decisions in a hierarchy are made by its most powerful members. Ultimately, all hierarchical trust is rooted in the King. A hierarchy does not need a constitution.

TC/DRM 7 Apr Legitimation and enforcement Hierarchies have difficulty with legitimation. What happens if more than one person claims to be King? What happens if the King rules poorly? Peerages have difficulty with enforcement. What happens if a peer ignores the decisions of the peerage? What happens if a peer does not abide by the constitution? Can we use a peerage to legitimate a hierarchy, and a hierarchy to enforce a peerage? I am trying to specify a general-purpose trusted operating system with a well-defined assurance mechanism. There are other possible designs, because peerages are not the only means of legitimation. Legitimation will occur with the passage of time, if trust is not abused. So peers and hierarchs will gain trust in any computer system to which they grant privileges. In most communication and computation technologies we have a set of “de facto” standards, with a monopoly controlling their implementation and assurance. Is this appropriate for the world’s trusted computing?

TC/DRM 7 Apr A Legitimised Hierarchy with an Empowered Peerage Auditor IG2IG1 TC Root Administrator TC Users Chair of User Assurance Group Inspector-General (an elected officer) Each user assurance group must develop its own Audit objectives (to assure their agreed security requirements). The OS Administrator may refuse to accept an Auditor, in which case the users should move to a different OS. The OS Administrator makes a Trusting appointment when granting auditor-level Privilege to one of the inspector-generals. The Auditor is the most privileged actor.

TC/DRM 7 Apr Security Governance Responsibilities of the governors: Specification, or Policy (answering the question of what the system is supposed to do), Implementation (answering the question of how to make the system do what it is supposed to do), and Assurance (answering the question of whether the system is meeting its specifications). We’re still in the early stages of corporate ECM and TC. The monumental failures of early DRM systems (from InterTrust and MediaSnap) in ECM markets were the result of poor specifications and overly-ambitious implementations. Will the TC features of Vista or Red Hat Enterprise Linux 5 be useful in corporations? In e-government? Will it be easy to build trustworthy bridges between Vista and Linux? Technology is not the only option for implementation.

TC/DRM 7 Apr Implementation Methods [adapted from Lessig’s theory] EasyDifficult Inexpensive Expensive Our technological architectures make things easy or difficult. LegalIllegal Our laws make things legal or illegal. Our economies make things inexpensive or expensive. Moral Immoral Our cultures make things moral or immoral.

TC/DRM 7 Apr Secure Bridges, Diverse Systems Security is well-defined for hierarchical systems. The hierarch controls specification, implementation and assurance. Security is problematic for peerages, and in communications between hierarchies and peerages. Every peer, and every hierarch, has different security goals. If an organisation wants to communicate effectively with others, it must formalise its security goals in its own computer systems, it must reveal these security goals to communication partners when forming bridges, and it must trust these partners to respect these goals. If organisations restrict bridge formation excessively, they will not be able to communicate effectively. Some trust is necessary, otherwise no action is possible. If organisations do not impose any limits on bridge formation and use, they will be highly vulnerable to misplaced trust.

TC/DRM 7 Apr An Appeal for Cooperation The New Zealand has specified four requirements on TC/DRM technology in e-government. See policies-06/tc-drm-0906.pdf. policies-06/tc-drm-0906.pdf These requirements can be met by a TC/ECM system, in which imported documents are in technical control of the recipient. In TC/DRM systems, the licensor has some control over the licensee’s computer. This is unacceptable to the NZ government, and it is worrisome for corporations and individuals. Other governments, and large corporations, have similar security requirements on TC and ECM. A broadly-constituted peer-assurance group would promote appropriate technologies, and it would allow us to build trustworthy bridges to other members of our group. I am trying to form a peer-assurance group. Will you help?