Download presentation
Presentation is loading. Please wait.
1
OM-AM and RBAC Ravi Sandhu* www.list.gmu.edu
Laboratory for Information Security Technology (LIST) George Mason University
2
THE OM-AM WAY A What? s u Objectives r Model a n Architecture c
Mechanism How?
3
OM-AM AND MANDATORY ACCESS CONTROL (MAC)
u r a n c e What? How? No information leakage Lattices (Bell-LaPadula) Security kernel Security labels
4
OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)
u r a n c e What? How? Owner-based discretion numerous ACLs, Capabilities, etc
5
OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)
u r a n c e What? How? Objective neutral RBAC96, ARBAC97, etc. user-pull, server-pull, etc. certificates, tickets, PACs, etc.
6
Server-Pull Architecture
Client Server User-role Authorization Server
7
User-Pull Architecture
Client Server User-role Authorization Server
8
Proxy-Based Architecture
Client Proxy Server Server User-role Authorization Server
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.