Cyber-Identity, Authority and Trust in an Uncertain World - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber-Identity, Authority and Trust in an Uncertain World

Description:

Cyber-Identity, Authority and Trust in an Uncertain World. Prof. ... George Mason University. www.list.gmu.edu. sandhu_at_gmu.edu. 2 2004 Ravi Sandhu. Outline ... – PowerPoint PPT presentation

Number of Views:19
Avg rating:3.0/5.0
Slides: 22
Provided by: cseBu
Learn more at: https://cse.buffalo.edu
Category:

less

Transcript and Presenter's Notes

Title: Cyber-Identity, Authority and Trust in an Uncertain World


1
Cyber-Identity, Authority and Trust in an
Uncertain World
  • Prof. Ravi Sandhu
  • Laboratory for Information Security Technology
  • George Mason University
  • www.list.gmu.edu
  • sandhu_at_gmu.edu

2
Outline
  • Perspective on security
  • Role Based Access Control (RBAC)
  • Objective Model-Architecture Mechanism (OM-AM)
    Framework
  • Usage Control (UCON)

3
Security Conundrum
  • Nobody knows WHAT security is
  • Some of us do know HOW to implement pieces of it

Result hammers in search of nails
4
Security Confusion
  • DRM, client-side controls

INTEGRITY modification
AVAILABILITY access
CONFIDENTIALITY disclosure
5
Security Successes
  • On-line banking
  • On-line trading
  • Automatic teller machines (ATMs)
  • GSM phones
  • Set-top boxes
  • .

Success is largely unrecognized by the security
community
6
Good enough security
Security geeks
Real-world users
SECURE
EASY
  • whose security
  • perception or reality of security
  • end users
  • operations staff
  • help desk

System owner
Business models dominate security models
COST
  • system solution
  • operational cost
  • opportunity cost
  • cost of fraud

7
Good enough security
COST
L
M
H
Entrepreneurial mindset
Academic mindset
H
1
2
3
R I S K
2
3
4
M
L
3
4
5
8
RBAC96 model(Currently foundation of a
NIST/ANSI/ISO standard)
ROLE HIERARCHIES
USER-ROLE ASSIGNMENT
PERMISSIONS-ROLE ASSIGNMENT
ROLES
USERS
PERMISSIONS
SESSIONS
CONSTRAINTS
9
Fundamental Theorem of RBAC
  • RBAC can be configured to do MAC
  • MAC is Mandatory Access Control as defined in the
    Orange Book
  • RBAC can be configured to do DAC
  • DAC is Discretionary Access Control as defined in
    the Orange Book

RBAC is policy neutral
10
THE OM-AM WAY
A s s u r a n c e
What?
  • Objectives
  • Model
  • Architecture
  • Mechanism

How?
11
OM-AM AND MANDATORY ACCESS CONTROL (MAC)
A s s u r a n c e
No information leakage Lattices
(Bell-LaPadula) Security kernel Security labels
12
OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)
A s s u r a n c e
Owner-based discretion numerous numerous ACLs,
Capabilities, etc
13
OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)
A s s u r a n c e
Objective neutral RBAC96, ARBAC97,
etc. user-pull, server-pull, etc. certificates,
tickets, PACs, etc.
14
RBAC96 Model
15
Server-Pull Architecture
Client
Server
User-role Authorization Server
16
User-Pull Architecture
Client
Server
User-role Authorization Server
17
Proxy-Based Architecture
Client
Server
Proxy Server
User-role Authorization Server
18
Usage Control (UCON) Coverage
  • Protection Objectives
  • Sensitive information protection
  • IPR protection
  • Privacy protection
  • Protection Architectures
  • Server-side reference monitor
  • Client-side reference monitor
  • SRM CRM

19
Core UCON (Usage Control) Models
  • Continuity
  • Decision can be made during usage for continuous
    enforcement
  • Mutability
  • Attributes can be updated as side-effects of
    subjects actions

20
Examples
  • Long-distance phone (pre-authorization with
    post-update)
  • Pre-paid phone card (ongoing-authorization with
    ongoing-update)
  • Pay-per-view (pre-authorization with pre-updates)
  • Click Ad within every 30 minutes
    (ongoing-obligation with ongoing-updates)
  • Business Hour (pre-/ongoing-condition)

21
Good enough security
COST
  • Entrepreneurial
  • Mindset
  • 80 problem
  • soft, informal
  • ordinary consumers

L
M
H
  • Academic
  • Mindset
  • 120 problem
  • hard, informal
  • techno-geeks

H
1
2
3
R I S K
2
3
4
M
L
3
4
5
Write a Comment
User Comments (0)
About PowerShow.com