1/30/20161 Computer Security Access Control Matrix.

Slides:



Advertisements
Similar presentations
Protection Goals of Protection Domain of Protection Access Matrix
Advertisements

1 Access Control. 2 Objects and Subjects A multi-user distributed computer system offers access to objects such as resources (memory, printers), data.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
8.2 Discretionary Access Control Models Weiling Li.
1 Access Control Matrix CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 9, 2004.
Authentication James Walden Northern Kentucky University.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Bilkent University Department of Computer Engineering
April 6, 2004ECS 235Slide #1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe Defaults –Economy of Mechanism –Complete Mediation.
Reasons for Protection n Prevent users from accessing information they shouldn’t have access to. n Ensure that each program component uses system resources.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
590J Lecture 21: Access Control (contd). Review ● Recall: – Protection system is a description of conditions under which a system is secure – P is the.
Chapter 14: Protection.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
1 Access Control Matrix CSSE 442 Computer Security Larry Merkle, Rose-Hulman Institute March 16, 2007.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
Protection.
Csci5233 computer security & integrity 1 Access Control Matrix.
IS-2150/TEL-2810: Introduction of Computer Security1 September 7, 2005 Introduction to Computer Security Access Control Matrix Take-grant model.
ECE509 Cyber Security : Concept, Theory, and Practice Access Control Matrix Spring 2014.
Chapter 2: Access Control Matrix
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection State Transitions –Commands –Conditional Commands.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Slide #2-1 Access Control Matrix and Safety Results CS461/ECE422 Computer Security I, Fall 2009 Based on slides provided by Matt Bishop for use with Computer.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
November 1, 2004Introduction to Computer Security © 2004 Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection.
CSE Operating System Principles Protection.
September 10, 2012Introduction to Computer Security © 2004 Matt Bishop Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model.
PROTECTION.
IS 2150 / TEL 2810 Introduction to Security
Chapter 14: System Protection
Chapter 14: Protection.
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Chapter 14: Protection.
Chapter 13: Design Principles
CE Operating Systems Lecture 21
Computer Security Access Control Matrix
Chapter 14: Protection.
IS 2150 / TEL 2810 Introduction to Security
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Outline Motivation Access Control Matrix Model
Computer Security: Art and Science, 2nd Edition
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 2: Access Control Matrix
Chapter 14: Protection.
Chapter 14: Protection.
IS 2150 / TEL 2810 Introduction to Security
Computer Security Access Control Mechanisms
IS 2150 / TEL 2810 Introduction to Security
Chapter 2: Access Control Matrix
Presentation transcript:

1/30/20161 Computer Security Access Control Matrix

1/30/20162 States of a Computer System The state of a system is the collection of current values of all components of the system: memory locations, secondary storage, registers etc. Protection states are those states that have to be protected.. P = set of all protection states of the system. Q = set of all authorized protection states The system is not secure if the current state is in P - Q A security policy characterizes the states in Q A security mechanism prevents the system entering a state in P - Q

1/30/20163 Access Control Matrix Model This is used to describe the protection states. It characterizes the rights of each subject of the system (entity/process) regarding the objects of the system (entities/processes) in terms of a matrix.

1/30/20164 Butler-Lampson Model This describes the rights of users s (subjects) over files o (objects) by a matrix A whose rows are indexed by the subjects and whose columns are indexed by the objects. The rights belong to a set R. Each entry a [ s,o ] of matrix A belongs to the set R, and is the right of user s over file o.

1/30/20165 Butler-Lampson Model In this model set of protection states P is a set of triples in ( S,O,A ), where S is the set of users, O the set of files and A the Access Control Matrix. The set of rights R (the entries in M) depends on the application.

1/30/20166 Examples of ACMs file 1 file 2 process 1 process 2 process 1 R, W, O R R, W, E, O W process 2 A R, O R R, W, E, O Here R = { Read, Wright, Own, Append, Execute } process 1 can read/write file 1, read file 2, communicate with process 2 by writing to it, etc.

1/30/20167 Examples: rights on a LAN host names telegraph nob toadflex telegraph own ftp ftp nob ftp, nfs, amil own ftp, nfs, mail toadflex ftp, mail ftp, nfs, amil own Here R = { ftp, mail, nfs, own }, where ftp = the right to access the File Transfer Protocol mail = the right to send/receive using the Simple Mail Transfer Protocol (SMTP) nfs = the right to access file systems using the Network File System protocol

1/30/20168 Examples: rights in a program host names counter inc_ctr dec_ctr manager inc_ctr + dec_ctr - manager call call call Here inc_ctr increases a counter and dec_ctr decreases it. R = { +, -, call }

1/30/20169 Other examples Access Control by Boolean expression evaluation Access Control by History See textbook

1/30/ Protection State Transitions Initial state of the system: X 0 = (S 0,O 0,A 0 ) Transitions:  1,  2, … Corresponding states: X 1, X 2, … We use the notation: X i ├─  i+1 X i+1 to indicate the state transition from X i to X i+1 X ├─ * Y indicates that starting at X, after a series of transitions the system enters state Y.

1/30/ Protection State Transitions X i ├─ c i+1 ( p i+ 1,1,…, p i+1,m ) X i+1 Indicates that the transition is caused by the command c i+1 on the parameters p i+1,1,…, p i+1,m.

1/30/ The Harrison-Ruzzo-Ullman Model This is based on a set of primitive commands. create subject s create object o Enter right r into a [ s,o ] Delete right r from a [ s,o ] destroy subject s destroy object o

1/30/ The Harrison-Ruzzo-Ullman Model Example command create file ( p,f ) create object f ; enter right own into a ( p,f ) ; enter right r into a ( p,f ) ; enter right w into a ( p,f ) ; end

1/30/ The Harrison-Ruzzo-Ullman Model Example – conditional commands Suppose process p wants to give process q the right to read file f command grant read file1 ( p,f,q ) if own in a [ p,f ] then enter r into a [ q,f ] ; end

1/30/ The Harrison-Ruzzo-Ullman Model Example – conditional commands using and Suppose process p wants to give process q the right to read file f command grant read file2 ( p,f,q ) if r in a [ p,f ] and c in a [ p,f ] then enter r into a ( q,f ) ; end See textbook for other examples.

1/30/ Copying and owning Rights copy right ( grant right ) – augments existing rights own right The copy right allows its possessor to grant rights (this right is often considered a flag attachment –hence flag right ) The own right allows its possessor to add or delete privileges to themselves.

1/30/ Copying Example Suppose process p has right r over object f, and let c be a copy right. The following command allows p to copy r over f to another process q only if p has copy right over f. command grant r ( p,f,q ) if r in a [ p,f ] and c in a [ p,f ] then enter r into a ( q,f ) ; end

1/30/ Attenuation of privilege The Principle of Attenuation of Privilege says that a subject may not give rights it does not possess to another subject.