DOC PREVIEW
Pitt IS 2150 - Lecture Notes

This preview shows page 1-2-16-17-18-33-34 out of 34 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IS 2150 / TEL 2810 Introduction to SecurityObjectiveClark-Wilson Integrity ModelClark/Wilson Model EntitiesClark/Wilson: Certification/Enforcement RulesClark-Wilson: Certification/Enforcement RulesSlide 7Clark-WilsonSlide 9Chinese Wall ModelExampleCW-Simple Security Property (Read rule)WritingCW-*-Property (Write rule)Slide 15Role Based Access Control (RBAC)RBACRBAC (NIST Standard)Core RBAC (relations)RBAC with Role HierarchyRBAC with General Role HierarchySlide 22Constrained RBACStatic Separation of DutyDynamic Separation of DutyCan we represent BLP using RBAC?Advantages of RBACRBAC’s BenefitsCost BenefitsSlide 30Problem: Consistent PoliciesSecure InteroperabilitySecure Interoperability (Example)Summary1IS 2150 / TEL 2810Introduction to SecurityJames JoshiAssociate Professor, SISLecture 6October 6, 2009Hybrid ModelsRole based Access Control2ObjectiveDefine/Understand various Integrity modelsClark-WilsonDefine/Understand Chinese Wall ModelRole-based Access Control modelOverview the secure interoperation issue3Clark-Wilson Integrity ModelTransactions as the basic operationIntegrity defined by a set of constraintsData in a consistent or valid state when it satisfies theseExample: BankD today’s deposits, W withdrawals, YB yesterday’s balance, TB today’s balanceIntegrity constraint: D + YB –WWell-formed transaction A series of operations that move system from one consistent state to anotherState before transaction consistent  state after transaction consistentIssue: who examines, certifies transactions done correctly?Separation of duty is crucial4Clark/Wilson Model EntitiesConstrained Data Items (CDI) : data subject to Integrity ControlEg. Account balancesUnconstrained Data Items (UDI): data not subject to ICEg. Gifts given to the account holdersIntegrity Verification Procedures (IVP)Test CDIs’ conformance to integrity constraints at the time IVPs are run (checking that accounts balance)Transformation Procedures (TP); Examples?5Clark/Wilson:Certification/Enforcement RulesC1: When any IVP is run, it must ensure all CDIs are in valid stateC2: A TP must transform a set of CDIs from a valid state to another valid stateTR must not be used on CDIs it is not certified forE1: System must maintain certified relationsTP/CDI sets enforced6Clark-Wilson: Certification/Enforcement RulesE2: System must control users(user, TP, {CDI}) mappings enforced C3: Relations between (user, TP, {CDI}) must support separation of duty E3: Users must be authenticated to execute TPNote, unauthenticated users may manipulate UDIs7Clark-Wilson: Certification/Enforcement RulesC4: All TPs must log undo information to append-only CDI (to reconstruct an operation)C5: A TP taking a UDI as input must either reject it or transform it to a CDIE4: Only certifier of a TP may change the list of entities associated with that TP; Certifier cannot executeEnforces separation of duty (?)8Clark-WilsonClark-Wilson introduced new ideasCommercial firms do not classify data using multilevel scheme they enforce separation of dutyNotion of certification is different from enforcement; enforcement rules can be enforced, certification rules need outside intervention, andprocess of certification is complex and error prone9Hybrid Policies10Chinese Wall ModelSupports confidentiality and integrityInformation flow between items in a Conflict of Interest setApplicable to environment of stock exchange or investment houseModels conflict of interestObjects: items of information related to a companyCompany dataset (CD): contains objects related to a single companyWritten CD(O)Conflict of interest class (COI): contains datasets of companies in competitionWritten COI(O)Assume: each object belongs to exactly one COI class11ExampleBank COI ClassBank of AmericaBank of AmericaCitizens BankCitizens BankPNC BankPNC BankGasoline Company COI ClassShell OilShell OilUnion’76Union’76Standard OilStandard OilARCOARCO12CW-Simple Security Property (Read rule)CW-Simple Security Property s can read o if any of the following holds o’  PR(s) such that CD(o’) = CD(o) o’, o’  PR(s)  COI(o’)  COI(o), oro has been “sanitized”(o’  PR(s) indicates o’ has been previously read by s)Public information may belong to a CDno conflicts of interest ariseSensitive data sanitized13WritingAlice, Bob work in same trading houseAlice can read BankOfAmercia’s CD,Bob can read CitizensBanks’s CD, Both can read ARCO’s CDAlice could write to ARCO’s CD, what is a problem?14CW-*-Property (Write rule)CW-*- Propertys can write o iff the following holdsThe CW-simple security condition permits S to read O.For all unsanitized objects o’, s can read o’  CD(o’) = CD(o)Alice can read both CDs Is Condition 1 met?She can read unsanitized objects of BankOfAmercia, hence condition 2 is falseCan Alice write to objects in ARCO’s CD?15Role-Based Access Control16Access control in organizations is based on “roles that individual users take on as part of the organization”Access depends on function, not identityExample: Allison is bookkeeper for Math Dept. She has access to financial records. If she leaves and Betty is hired as the new bookkeeper, Betty now has access to those records. The role of “bookkeeper” dictates access, not the identity of the individual.A role is “is a collection of permissions”Role Based Access Control (RBAC)17RBACu1u2uno1o2omu1u2uno1o2omRolern + massignmentsn massignmentsUsersPermissionUsersPermissions(a)(b)AdministratorEmployeeEngineerSeniorEngineerSeniorAdministratorManagerTotal number Of assignmentsPossible?Total number Of assignmentsPossible?18PermissionsRBAC (NIST Standard)Users Roles Operations ObjectsSessionsUAuser_sessions(one-to-many)role_sessions(many-to-many)PAWhat model entity would relate to the traditional notion of subject?What model entity would relate to the traditional notion of subject?Total number of subjects possible?Total number of subjects possible?Role vs Group?Role vs Group?19Core RBAC (relations)Permissions = 2Operations x Objects UA ⊆ Users x RolesPA ⊆ Permissions x Rolesassigned_users: Roles  2Users assigned_permissions: Roles  2PermissionsOp(p): set of operations associated with permission pOb(p):


View Full Document

Pitt IS 2150 - Lecture Notes

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?