DOC PREVIEW
Pitt IS 2150 - Hybrid Models

This preview shows page 1-2-3-26-27-28 out of 28 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IS 2150 / TEL 2810IS 2150 / TEL 2810Introduction to SecurityJames JoshiAssistant Professor, SISLecture 6September 30, 2008Hybrid ModelsRole based Access Control1Objective Define/Understand  Chinese Wall Model Role-based Access Control model Overview the secure interoperation issue2Hybrid PoliciesHybrid Policies3Chinese Wall Model Supports confidentiality and integrity Information flow between items in a Conflict of Interest set Applicable to environment of stock exchange or investment pp ab e o e o e o s o e a ge o es ehouse Models conflict of interestObjects: items of information related to a companyCompany dataset(CD): contains objects related to a single company Written CD(O)Conflict of interest class(COI): contains datasets of companies in competition Written COI(O)Assume: each object belongs to exactly oneCOIclass4Assume: each object belongs to exactly one COIclassExampleBank COI ClassGasoline Company COI ClassBank COI ClassBank of AmericaBank of AmericaGasoline Company COI ClassShell OilShell Oil Standard OilStandard OilCitizens BankCitizens BankPNC BankPNC BankUnion’76Union’76ARCOARCO5CW-Simple Security Property (Read rule) CW-Simple Security Property scan read o iffany of the following holds ∃o’∈PR(s) such that CD(o’) = CD(o) ∀o’, o’∈PR(s) ⇒COI(o’) ≠COI(o), orohas been“sanitized”ohas been sanitized(o’∈PR(s) indicates o’has been previously read by s) Public information may belong to a CD no conflicts of interest ariseSensiti e data saniti ed6Sensitive data sanitizedWriting Alice, Bob work in same trading houseAlice can readBankOfAmercia’sCD,Alice can read BankOfAmercia sCD, Bob can read CitizensBanks’s CD, Both can readARCO’sCDBoth can read ARCO sCD Alice could write to ARCO’s CD, what is a problem?what is a problem?7CW-*-Property (Write rule) CW-*- Propertyscan write oiff the following holdsThe CW-simple security condition permits S to read O. For all unsanitized objects o’, s can read o’ ⇒CD(o’) = CD(o)CD(o) Alice can read both CDs Is Condition 1 met?Is Condition 1 met? She can read unsanitized objects of BankOfAmercia, hence condition 2 is falseC Ali it t bj t i ARCO’ CD?8Can Alice write to objects in ARCO’s CD?Role-Based Access ControlRoleBased Access Control9Role Based Access Control (RBAC) Access control in organizations is based on “roles that individual users take on as part of the organization”pg Access depends on function, not identity Example: Allison is bookkeeper for Math Dept. She has access to financial records. If she leaves and Betty is hired as the new bookkeeper, Betty now has access to those records. The role of “bookkeeper”dictates access, not the identity of the individual.bookkeeper dictates access, not the identity of the individual. A role is “is a collection of permissions”10RBACu1o1u1o1UsersPermissionUsersPermissionsManageru2o2u2o2RolerSeniorEngineerSeniorAdm inistratorunomunomAdm inistrator Engineern+ massignmentsn×massignmentsEmployeeTotal number Of assignmentsTotal number Of assignments11(a)(b)gPossible?gPossible?RBAC (NIST Standard)URlOtiObj tUAPAPermissionsUsersRolesOperationsObjectsuser_sessions(one-to-many)role_sessions(many-to-many)What model entity would relate toWhat model entity would relate toSessionsWhat model entity would relate to the traditional notion of subject?What model entity would relate to the traditional notion of subject?Total number of subjects possible?Total number of subjects possible?12Role vs Group?Role vs Group?Core RBAC (relations)Pii2OtiPermissions = 2Operations x Objects UA ⊆ Users x Rolesuser_sessions: Users → 2Sessions PA ⊆ Permissions x Rolesassigned users:Roles→session_user: Sessions → Userssession_roles: Sessions → 2Rolesl()assigned_users: Roles →2Usersassigned_permissions: Roles →2Permissionssession_roles(s) = {r| (session_user(s), r) ∈ UA)}avail session perms: Sessions→→2Op(p): set of operations associated with permission pavail_session_perms: Sessions →2Permissions13Ob(p): set of objects associated with permission pRBAC with Role HierarchyRH(role hierarchy)UAPAPermissionsUsers Roles Operations ObjectsPermissionsuser_sessions(one-to-many)role_sessions(many-to-many)14SessionsRBAC with General Role Hierarchyauthorized_users: Roles→ 2Usersauthorized_users(r) = {u| r’ ≥ r&(r’, u) ∈UA}th i d i iRl2Permissionsauthorized_permissions: Roles→2Permissionsauthorized_permissions(r) = {p| r≥ r’&(p, r’) ∈PA} RH ك Roles x Roles is a partial order called the inheritance relation written as ≥written as ≥. (r1≥ r2) →authorized_users(r1) كauthorized_users(r2) &authorized_permisssions(r2) كauthorized_permisssions(r1)15What do these mean?What do these mean?authorized users(Employee)?authorized users(Employee)?Exampleauthorized_users(Employee)?authorized_users(Administrator)?authorized_permissions(Employee)? authorized permissions(Administrator)?authorized_users(Employee)?authorized_users(Administrator)?authorized_permissions(Employee)? authorized permissions(Administrator)?px, pye10authorized_permissions(Administrator)?authorized_permissions(Administrator)?Managerpx, pye5px, pye8, e9SeniorEngineerSeniorAdministratorpa, pbppe1e2px, pye3, e4px, pye6, e7poppAdministratorEmployeeEngineerpppapbpx, pye1, e2pm, pn16px, pyp1, p2pmpnConstrained RBACRHRH(role hierarchy)StaticSeparation of DutyPAUsers Roles Operations ObjectsUAPAPermissionsuser_sessions(one-to-many)DynamicSti17SessionsSeparation of DutyStatic Separation of DutySSDك2Rolesx N In absence of hierarchy Collection of pairs (RS, n) where RSis a role set, n≥ 2for all(RS, n) ∈SSD, for all tكRS: |t| ≥ n→ ∩r∈tassigned users(r)= ∅||r∈tg_() In presence of hierarchyCollection of pairs (RS n) where RS is a role set n ≥ 2;Describe!Collection of pairs (RS, n) where RS is a role set, n ≥ 2; for all(RS, n) ∈SSD, for all tكRS: |t| ≥ n→ ∩r∈tauthorized_uers(r)= ∅Describe!18Describe!Dynamic Separation of DutyDSD2Rolesx N Collection of pairs (RS, n) where RSis a role set, ≥ 2n≥ 2;  A user cannot activate nor more roles from RS What is the difference between SSD or DSD containing:(RS, n)? Consider (RS, n) = ({r1, r2, r3}, 2)? If SSD – can r1, r2and r3be assigned to u? If DSD – can r1, r2and r3be assigned to


View Full Document

Pitt IS 2150 - Hybrid Models

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download Hybrid Models
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Hybrid Models and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Hybrid Models 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?