DOC PREVIEW
UCCS CS 622 - Secure Role Based IM

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Secure Role Based IM using ENforCESecure Role Based IMThe ENforCE SystemRole Based HierarchyWhat ENforCE ProvidesServer Algorithm(Two) One Way Communication Request(s)Conceptual DesignClientsProgressQuestions??Kelly Whitacre, Kunal Bele , and Mike GerschefskeSecure Role Based IMCreate an IM to cut down on excess chattingRestrict users to chat only with people with similar roles within departmentProvide Mechanism to allow users to request chat outside specific roleLeverage ENforCE2Policy Enforcement PointPolicy Enforcement PointGlobal.asaxASP.NET ApplicationFC4 machine (Firewall)FC4 machine (Firewall)Iptables Control ServiceB8) Network- resource AccessIIS AuthenticationISAPIProtected web resourcesProtected web resourcesA2) Http requestA5) XML responseSession policy sourceSession policy sourceA3/ B3) Get User's ACRPSPPSDomain ControllerDomain ControllerActive DirectoryActive DirectoryB2) Http request A1/B1) User RequestProtected Network resourcesProtected Network resources B7) XML response Policy DecisionPointPolicy DecisionPointB6) Open or Close service commandsA4/B4) GetDecisionThe ENforCE System3Role Based Hierarchy4What ENforCE ProvidesAbility to determine if a user has access to a resourcei.e. user changed jobs, or was firedUsers’ management chainsYet, Our Policy Enforcement is in our Server rather then Enforce5Server AlgorithmCheck if user 1 can communicate with user 2 via XACML request to ENforCEIf not, ENforCE determines highest manager of user 1 required to get authorization to user 2Send request to that manager and wait for acceptanceIf authorized allow user 1 to send data to user 2 for some period of timeObtain Public Key of Receiver by AD of ENforCE for Client of SenderNote:One way communicationMessage sent to manager requiring token to be sent back to acknowledge acceptance6(Two) One Way Communication Request(s)7Conceptual DesignENforCEServerBob AliceBob’sBossAlice’sBossADXACML8IISClientsVery SimpleSend messages containingMessageToBuddy List/Active Directory Browsing could be addedClients encrypt via destinations public keyCould look into asymmetric crypto9ProgressExtracted IIS and DC of ENforCERecreated FWProblems with Windows ActivationProblems with VMware Converter removing hardwareProblems with physical Unix


View Full Document

UCCS CS 622 - Secure Role Based IM

Documents in this Course
Fast TCP

Fast TCP

34 pages

Load more
Download Secure Role Based IM
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Role Based IM and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Role Based IM 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?