CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.

Slides:



Advertisements
Similar presentations
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Access Control Methodologies
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
8.2 Discretionary Access Control Models Weiling Li.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
DDBMS Security - Bakul Gada.
Security and Integrity
Database Management System
Access Control Intro, DAC and MAC System Security.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Chapter 11 Firewalls.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
Controlling Collaborative Systems -Srinivas Krishnan Dept of Computer Science UNC-Chapel Hill.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
MANDATORY FLOW CONTROL Xiao Chen Fall2009 CSc 8320.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
Protection.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Distributed computer security 8.2 Discretionary Access Control Models -Ranjitha Shivarudraiah.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
8.2 D ISCRETIONARY A CCESS C ONTROL M ODELS Shuman Guo CSc8320.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Academic Year 2014 Spring Academic Year 2014 Spring.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Discretionary Access Control Models Adith Srinivasan.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Security. Digital Signatures Digital Signatures Using MD.
Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Database System Implementation CSE 507
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Protection and Security
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Computer Data Security & Privacy
SECURITY IN DISTRIBUTED FILE SYSTEMS
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
OS Access Control Mauricio Sifontes.
Chapter 14: Protection.
Chapter 14: Protection.
Access Control.
Computer Security Access Control
CS703 - Advanced Operating Systems
Access Control What’s New?
Presentation transcript:

CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang

Overview Part 1: Fundamental Knowledge Part 2: Current Technology Part 3: Future Research

Part 1: Fundamental Knowledge

The Access Control Matrix (ACM) [1, Randy Chow, 1997] The Access Control Matrix (ACM) is the most fundamental and widely used discretionary access control model for simple security policies. Access control is a function that given a subject and object pair, (s, o) and a requested operation, r from s to o, return true if the request is permitted.

Two Types of Security Policies Simple Security Policy A statement that specifies what privileges and limitation a certain subject has on an object, without ant special constraints. Complex Security Policy Security requirements that are dependent on how and when other access are being performed. Eg. a subject can access object x if it has not already access object y.

Example of ACM - Resource ACM

Example of ACM - Process ACM

Example of ACM - Domain ACM

Reducing the Size of Access Control Matrix The user subjects are generally related and could have similar access rights to some commom objects. Rows in ACM can be mergerd as a single group of user. A user is identfied with a group name which is based on group rather than the user name. Object columns can be merged as categories which a based on objects rather than the attributes of the users.

Distributed Compartments A distributed application with collaborating processes may consists of subject users and object resources crossing the physical boundaries of physical resources. Because it is impossible to have a global ACM, a logical ACM called a ‘distributed compartment’ that regulates access among the collaborating users would serve a better purpose.

Each distributed compartment has at least one member called an owner which has the maximum privleged. Access to the distributed compartments are based on ‘distributed handles’ rather than user ID. These handles are application oriented and they provide a protective wall around an application and are authenticated by the application.

Distributed Compartments

ACM Implementations The Linked list structure that contains all entries in a column for a particular object is called a Access control List (ACL) for the object. An ACL specifies the permissible rights that various subjects have on the object. Likewise all entries in a row for a subject is called a Capability List (CL) for the subject. A CL specifies privileges to various objects held by a subject

ACM Implementations Subject Client ACL S = {S i } s Є S and r Є R s ? Object Server s (r, s) ACL Implementation o Є O and r Є R o ? Object Server CL = O = {O i } (o, s) Subject Client CL Implementation

ACM Implementations LL = o Є O ? K=l? r Є R l ? Object Server CL = O = {O i } (o, r, k) Subject Client Lock-key Implemtation

Comparison of ACL & CL Authentication Reviewing of Access Rights Propagation of Access Rights Revocation of Access Rights Conversion between ACL and CL

Authentication ACL Authenticates subjects, which is performed by the system, no overhead. In CL, authentication is performed by the object server. But it’s easiler. It’s widely used in distributed system.

Review of Access Right Easier to review ACL, because ACL contains exactly this information. Difficult for CL unless some type of activity log is kept.

Propagation Of Access Rights In ACL, propagation of rights is initiated by a request to the object server, which modifies or adds an entry to its ACL. In CL, theoretically it is propagate rights between subjects without intervention of object server. But it may result in uncontrollable system.

Revocation of Access Rights Revocation is trivial in ACL because it is easy to delete subject entries from the ACL. It is difficult for CL’s to revoke access selectively.

Conversion Between ACL & CL Conversion from CL to ACL is straight forward. Conversion from ACL to CL Gateway Authenticates the process identifier and verifies the operation in the capability list. The remote host grants the accss request if its ACL contains the process as a subject and the requested opertion is within the authorized range.

Part 2: Current Technology

Role-based Access Control (RBAC) Access decisions are based on the roles that individual users have as part of an organization. Users take on assigned roles (such as doctor, nurse, teller, manager). The operations that a user is permitted to perform are based on the user's role. Role hierarchies can be established to provide for the natural structure of an enterprise. Organizations establish the rules for the association of operations with roles.

Application of Role-Based Access Control for Web Environment [2, Robles, R.J, 2004] Secure cookies provide three types of security services: authentication, integrity, and confidentiality. Authentication verifies the cookies’ owner. Integrity protects against unauthorized modification of cookies. Confidentiality protects against the cookies’ values being revealed to an unauthorized entity.

Part 3: Future Research

The PEI Framework for application-centric security [3, 4, Ravi Sandhu, 2009]

Reference [1] Randy Chow, Theodore Johnson, “Distributed Operating Systems & Algorithms”, Addison Wesley, 1997 [2] Robles, R.J.; Min-Kyu Choi; Sang-Soo Yeo; Tai-hoon Kim, "Application of Role-Based Access Control for Web Environment," Ubiquitous Multimedia Computing, UMC '08. International Symposium on, vol., no., pp , Oct [3] Ravi Sandhu, The PEI Framework for Application-Centric Security, 2009 [4] Krishnan, Ram and Sandhu, Ravi and anganathan, Kumar, PEI models towards scalable, usable and high-assurance information sharing, Proceedings of the 12th ACM symposium on Access control models and technologies

Thank You Q & A