Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.

Similar presentations


Presentation on theme: "11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman."— Presentation transcript:

1 11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011 International Workshop on Trusted Collaboration Institute for Cyber Security

2 2 Community is well demarcated geographical boundary  E.g. county or larger city Secure Information Sharing in Community Center for Infrastructure Assurance and Security (CIAS)  communication, incident response, disaster recovery, etc Sandhu et al 1 proposed an informal requirements for information sharing for cooperative cyber incident management in a community World-Leading Research with Real-World Impact! Community Cyber Security 1 R. Sandhu, R. Krishnan, and G. White. Towards secure information sharing models for community cyber security. In Proc. 6th IEEE Int. Conf. on Collaborative Computing, 2010.

3 3 Community Cyber Security Core Group Incident Group Open Group Automatic Membership Administered Membership Filtered RW Administered Membership Filtered RW Administered Membership Domain Experts World-Leading Research with Real-World Impact!

4 4 1 Role Based Trust Management (RT) framework  Strong mathematical foundation, explicit inclusions of roles, sizeable literature The basic constructs of RT 0  Entities (A, B 1, Alice, etc)  Role names (r, r 1, student, etc)  Role (A.r, B 1.r 1, U 1.student, etc) Four types of credentials (An Entity can issue)  Simple Member: A.r ← D  Simple Inclusion: A.r ← B.r  Linking Inclusion: A.r ← A.r 1.r 2  Intersection Inclusion: A.r ← B 1.r 1 ∩B 2.r 2 Administrative Model World-Leading Research with Real-World Impact! 1 N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a rolebased trust management framework. In Proc. of the IEEE Symposium on Security and Privacy, May 2002, 2010.

5 Community Elements Community Entities  CG (core group), OG (open group), IG (incident group)  CPS (San Antonio Energy Utility), SAWS (San Antonio Water System), SAPD (San Antonio Police Department)  SAT (Hypothetical Entity that represents the community), etc Roles  CG.user (All core group users)  SAT.member (Members of San Antonio Community)  CPS.itmember (IT members of CPS), etc World-Leading Research with Real-World Impact!

6 6 Membership Management (Core Group) SAT CG.user <- SAT.member.cgrep SAT.member <- CPS “Core” Group SAWS.cgrep <- Carol SAWS SAT.member <- SAPD SAT.member <- SAWS CPS SAPD CPS.cgrep <-Alice SAPD.cgrep <- Danl Alice Dan Carol World-Leading Research with Real-World Impact!

7 7 Membership Management (Open Group) SAT SAT.member <- CPS SAWS.itmembere <- Bob SAWS SAT.member <- SAPD SAT.member <- SAWS CPS SAPD CPS.itmember <-Eve SAPD.itmember <- Gray Eve Gray Bob “Open” Group OG.user <- CG.user ∩ OG.volunteer <-Eve OG.user <- SAT.member.itmember ∩ OG.volunteer I want! I don’t! World-Leading Research with Real-World Impact!

8 Membership Management (Incident Group) Core Group Alice Hilda Eve “Incident” Group ∩ ∩ ∩ Open Group Domain Expert CG.user IG.authorized ← Alice OG.user IG.authorized ← Eve SAT.domainexpert IG.authorized ← Hilda IG.user ← CG.user ∩ IG.authorized IG.user ← OG.user ∩ IG.authorized IG.user ← SAT.domainexpert ∩ IG.authorized World-Leading Research with Real-World Impact! 8

9 9 Single Document Releases to An Incident Group  Using RT 1 and RT Θ  An incident group can request a particular document to core  Parameterized Role CG.read(?o) can read single object ?o upon approval from core  A CG.user can approve it if he is not an IG.user of that Incident group Delegation of Role Activation  Using RT D Extended Features World-Leading Research with Real-World Impact!

10 10 Core Group Incident Groups Open Group Automatic Membership Administered Membership Filtered RW Administered Membership Domain Experts Community Cyber Security write Administered Membership Filtered Read Administered Membership World-Leading Research with Real-World Impact!

11 11 RT as an administrative model in this context Limitations of RT approach  Entity-Owned only membership  Reverse Credential Chains  Unable to Support Administration from an External Entity Conclusion World-Leading Research with Real-World Impact!


Download ppt "11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman."

Similar presentations


Ads by Google