Access Control Intro, DAC and MAC. System Security
|
|
- Theresa Shaw
- 8 years ago
- Views:
Transcription
1 Access Control Intro, DAC and MAC System Security
2 System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying entities Authorisation: assigning access rights to entities
3 Authentication Phase It is only concerned with identifying an entity against a known set Assigning a unique identifier to the entity (i.e., user name) Using a secret (supposedly) known only to the specific entity Alternatively, using a unique feature that characterizes the entity
4 Authorisation Phase Known also as Access Control The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner It assumes users have been authenticated to the system assigned access rights to certain resources on the system (for instance, by an admin)
5 Access Control Requirements Reliable Input Authenticated entities Genuine information Least Privilege Entities granted minimum set of access rights Administrative Duties Only a special entity should be able to manage access rights for other entities
6 Access Control Refinements Separation of Duty Fine Vs. Coarse Specifications Open and Closed policies (Automated) Conflict Resolution
7 Access Control Elements Subject entity that can access objects a process representing user/application Object access controlled resource e.g. files, directories, records, programs etc Access right way in which subject accesses an object e.g. read, write, execute, delete, create, search
8 Security Modules
9 Access Control Models Discretionary AC (DAC) Mandatory AC (MAC) Role based AC (RBAC) Usage Control (UCON) Policy based Access Control
10 Discretionary Access Control A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission on to any other subject Subjects are able to assign rights to other subjects on the objects they control Model used in operating systems and DB management systems Often provided using an access matrix
11 Access Control Matrix
12 Access Control List
13 Capability List Capability Myths Demolished: 02.pdf
14 Access Matrix Details
15 UNIX Access Control Lists Modern UNIX systems support ACLs Can specify any number of additional users / groups and associated rwxpermissions ACLs are optional extensions to std perms
16 Mandatory Access Control Entities cannot enable other entities to access their resources It enforces a lattice between labels assigned to subjects and object security labels: how sensitive or critical a system resource is security clearances: which entities are eligible to access certain resources
17 MAC: The Bell LaPadula Model The main goal is to control the confidentiality of information
18 MAC Confidentiality Rules Simple Security Property: No Read Up Read
19 MAC Confidentiality Rules *(Star)property: No Write Down Write
20 MAC Confidentiality Rules Strong *(Star) property: No Write Down & No Write up Write
21 MAC: Biba Integrity Model The main goal is to control the integrity of information
22 MAC Integrity Rules Simple Integrity Axiom: No Read Down Read
23 MAC Integrity Rules *(Star) Integrity Axiom: No Write Up Write
24 Where is MAC used BLP: Implemented the multi level security policy for US Department of Defense BIBA: Implemented in the FreeBSD MAC policy A combined versions of BLP and BIBA is used in Android
25 Summary Introduced access control principles subjects, objects, access rights Discretionary Access Control access matrix, access control lists (ACLs), capability tickets UNIX traditional and ACL mechanisms Mandatory Access Control Bell Lapadula Biba
26 Resources Chapter 8 in Mark Stamp, Information Security: Principles and Practice, Wiley Matt Bishop, Computer Security: Art and Science, Addison Wesley 2003.
27 Questions?
Information Flows and Covert Channels
Information Flows and Covert Channels Attila Özgit METU, Dept. of Computer Engineering ozgit@metu.edu.tr Based on: Mike McNett s presentation slides CENG-599 Data Security and Protection Objectives Understand
More informationAccess Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
More informationDatabase Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino bertino@cs.purdue.edu Discretionary Access Control (DAC) No precise definition Widely used in modern operating
More informationAccess Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
More information... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg
Lecture 3 Access Control Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M. Introduction
More informationSecurity Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com
More informationPart III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationRole Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
More informationIdentity Management and Access Control
and Access Control Marek Rychly mrychly@strathmore.edu Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
More informationSecurity Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
More informationMandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
More informationRBAC and HIPAA Security
Chief Executive, HIPAA Academy RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Session Objective Challenges HIPAA Requirements Seven Steps to HIPAA Security Access Control RBAC Information Access
More informationAccess Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
More informationISACA PROFESSIONAL RESOURCES
ISACA PROFESSIONAL RESOURCES SEGREGATION OF DUTIES WITHIN INFORMATION SYSTEMS This is an excerpt from the CISA Review Manual 2005 Chapter 2 - Management, Planning and Organization of IS CISA Review Manual
More informationLecture 14 Towards Trusted Systems Security Policies and Models
Lecture 14 Towards Trusted Systems Security Policies and Models Thierry Sans 15-349: Introduction to Computer and Network Security domains Definition of MAC MAC (Mandatory Access Control) A set of access
More informationBest Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
More informationDAC vs. MAC. Most people familiar with discretionary access control (DAC)
DAC vs. MAC Most people familiar with discretionary access control (DAC) - Example: Unix user-group-other permission bits - Might set a fileprivate so only groupfriends can read it Discretionary means
More informationAccess Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
More informationCSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
More informationInformation Security Information & Network Security Lecture 2
1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term 2 Security Policies 3 Introduction So you ve succeeded as SO in convincing people
More informationSECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
More informationAccess Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationAccess Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema
More informationIntroduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
More informationComputer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
More informationAccess Control. Dr George Danezis (g.danezis@ucl.ac.uk)
Access Control Dr George Danezis (g.danezis@ucl.ac.uk) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional
More informationITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
More informationOutline. INF3510 Information Security University of Oslo Spring 2015. Lecture 9 Identity Management and Access Control. The concept of identity
INF50 Information Security University of Oslo Spring 05 Outline Identity and access management concepts Identity management models Access control models (security models) Lecture 9 Identity Management
More informationCS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
More informationRole Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
More informationIntroduction to Computer Security
Introduction to Computer Security Access Control and Authorization Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access recapitulated 1. Identification Which object O requests
More informationAccess Control Lists in Linux & Windows
Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)
More informationWhat is a secret? Ruth Nelson
What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions
More informationINF3510 Information Security University of Oslo Spring 2016. Lecture 9 Identity Management and Access Control
INF3510 Information Security University of Oslo Spring 2016 Lecture 9 Identity Management and Access Control University of Oslo Spring 2016 Outline Identity and access management concepts Identity management
More informationLecture II : Communication Security Services
Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication
More informationIdentity Access Management Guidelines
Tasmanian Government Identity and Access Management Toolkit Part 4 Identity Access Management Guidelines Department of Premier and Cabinet For further information on the Toolkit, contact the Office of
More informationWindows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
More informationHow To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
More informationCOSC344 Database Theory and Applications. Lecture 23 Security and Auditing. COSC344 Lecture 23 1
COSC344 Database Theory and Applications Lecture 23 Security and Auditing COSC344 Lecture 23 1 Overview Last Lecture Indexing This Lecture Database Security and Auditing Security Mandatory access control
More informationMandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
More informationAssessment of Access Control Systems
Interagency Report 7316 Assessment of Access Control Systems Vincent C. Hu David F. Ferraiolo D. Rick Kuhn Interagency Report 7316 Assessment of Access Control Systems Vincent C. Hu David F. Ferraiolo
More informationIdentity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
More informationCompTIA Security+ Certification SY0-301
CompTIA Security+ Certification SY0-301 Centro Latino, Inc. Computer Technology Program Prof: Nestor Uribe, nuribe@centrolatino.org www.centrolatino.org 267 Broadway, Chelsea, MA 02150 Tel. (617) 884-3238
More informationSecurity and Cryptography 1. Stefan Köpsell, Thorsten Strufe. Module 8:Access Control and Authentication
Security and Cryptography 1 Stefan Köpsell, Thorsten Strufe Module 8:Access Control and Authentication Disclaimer: large parts from Stefan Katzenbeisser, Günter Schäfer Dresden, WS 14/15 Reprise from the
More informationSELinux. Security Enhanced Linux
SELinux Security Enhanced Linux Introduction and brief overview. Copyright 2005 by Paweł J. Sawicki http://www.pawel-sawicki.com/ Agenda DAC Discretionary Access Control ACL Access Control Lists MAC Mandatory
More informationSELinux Policy Management Framework for HIS
SELinux Policy Management Framework for HIS by Luis Franco Marin (05592763) BSc., MIT This thesis is presented in fulfilment of the requirements of the degree of Master of Information Technology (Research)
More informationSecurity Architecture and Design
IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield Domain Overview Identify key principles and concepts critical to securing the infrastructure
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationUSER ACCESS CONTROL AND SECURITY MODEL
102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap (crysdian@yahoo.com, harihodn@itp.utm.my, mohdnoor@fsksm.utm.my) Faculty of Computer Science and nformation
More informationUniversity of Cambridge
University of Cambridge Computer Laboratory ESSAYS ABOUT COMPUTER SECURITY Prof. E. Stewart Lee Director Centre for Communications Systems Research Cambridge Cambridge, 1999 Preface The purpose of these
More informationISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
More informationINF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2012 Lecture 8 Identity and Access Management Audun Jøsang Outline Identity and access management concepts Identity management models Access control
More informationBell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix
1 Security Policy A document that expresses clearly and concisely what the protection mechanisms are to achieve A statement of the security we expect the system to enforce Bell & LaPadula Model Formalization
More informationOriginator Control in Usage Control *
Originator Control in Usage Control * Jaehong Park Laboratory for Information Security Technology ISE Department, MS4A4 George Mason University, Fairfax, VA 22030 jaehpark@ise.gmu.edu, www.list.gmu.edu/park
More informationThe CRUD Security Matrix: A Technique for Documenting Access Rights
The CRUD Security Matrix: A Technique for Documenting Access Rights Dale L. Lunsford, Michael R. Collins Phillips School of Business High Point University Abstract The CRUD matrix is an excellent technique
More informationAccess Control Basics. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Basics Murat Kantarcioglu Access Control - basic concepts An access control system regulates the operations that can be executed
More informationReference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
More informationOpen Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationProduct Data Security and Access Management. Dilip Agrawal Security PLM Lead Ford Motor Company dagrawal@ford.com
Product Data Security and Access Management Dilip Agrawal Security PLM Lead Ford Motor Company dagrawal@ford.com 1 Objective Design a PLM security model that strengthen the enforcement of policies while
More informationCS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module
CS 665: Computer System Security Designing Trusted Operating Systems Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Trusted? An operating system is
More informationtion server uses an RBAC system to control access to resources under its domain, and the enforcement of access rules is provided by a security
ABSTRACT SHAH, ARPAN PRAMOD. Scalable authorization in role-based access control using negative permissions and remote authorization (Under the direction of Dr. Gregory T. Byrd). Administration of access
More informationWelcome to Information Systems Security (503009)
Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology thaonguyen@cse.hcmut.edu.vn Course Outline Week Lectures 1 Information systems security: basic
More informationSession objectives. Access control. Subjects and objects. The request. Information Security
The session Session objectives Access Control Information Security Dr Hans Georg Schaathun Introduce fundamental terminology of access control Understand principles of privilege management and identity
More informationWeighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
More informationFirewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
More informationUniversiteit Leiden ICT in Business
Universiteit Leiden ICT in Business The Rubik s cube model: A metadata driven approach to access control in modern ECM systems Name: Student-no: Orestis Gkikas s1218697 Date: 8/7/2014 1st supervisor: Dr.
More information2009-2010. SSL Firewalls
& 2009-2010 & ( ) SSL Firewalls :. :.. byte 0x01 : 1,. 1 , :,, : ( ) ). : : (Confidentiality) (Integrity) (Availability) :.,,. :. :...,,. :,,. 2 (Identification) (Authentication).,,, )... (Authorization)
More informationRewrite-Based Access Control Policies in Distributed Environments
Rewrite-Based Access Control Policies in Distributed Environments Maribel Fernández King s College London Joint work with Clara Bertolissi (LIF, Univ. Marseilles) 12th CREST Open Workshop - Security and
More informationMandatory Access Control Systems
CSE497b Introduction to Computer and Network Security - Spring 2007- Professor Jaeger Mandatory Access Control Systems CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger
More informationCertification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
More informationChapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
More informationInternational Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 8169. Volume: 1 Issue: 1 23 28 DATABASE SECURITY
DATABASE SECURITY Kamaljeet Kaur Computer Science & Engineering Department Guru Nanak Dev Engg. College, Ludhiana. Punjab-India meetk.89@gmail.com Abstract Ensuring the security of databases is a complex
More informationTowards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
More information<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
More informationNAVAL POSTGRADUATE SCHOOL DISSERTATION
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DISSERTATION AN APPLICATION OF ALLOY TO STATIC ANALYSIS FOR SECURE INFORMATION FLOW AND VERIFICATION OF SOFTWARE SYSTEMS by Alan B. Shaffer December 2008
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationAccess Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,
More informationSecTor 2009 October 6, 2009. Tracy Ann Kosa
SecTor 2009 October 6, 2009 Tracy Ann Kosa Privacy versus Security Un enforced Privacy Privacy Requirements that Work People Process Technology Territorial Privacy Setting boundaries on intrusion into
More informationRole-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
More informationCLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
More informationDocument Management System Security
Document Management System Security Jonas Birmé birme@cs.umu.se January 24, 2005 20 credits Umeå University Department of Computing Science SE-901 87 UMEÅ SWEDEN Abstract A common demand today is that
More informationDatabase Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
More informationAnalysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
More informationInformation Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2004 Vol. 3, no. 3, March-April 2004 L n RBAC: A Multiple-Levelled Role- Based Access
More informationNCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05
What s New NCP Secure Enterprise Management for Windows OS New Features version 1.03 to 2.05 Disclaimer Considerable care has been taken in the preparation and publication of this document, errors in content,
More informationThe Future of Access Control: Attributes, Automation and Adaptation
Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 ravi.sandhu@utsa.edu
More informationFirewalls. Mahalingam Ramkumar
Firewalls Mahalingam Ramkumar Evolution of Networks Centralized data processing LANs Premises network interconnection of LANs and mainframes Enterprise-wide network interconnection of LANs in a private
More informationDomain 9 Security Architecture and Design
Domain 9 Security Architecture and Design Common Architecture Frameworks An architecture framework is a structure that can be used to develop a broad range of architectures, which typically provides a
More informationQUT Digital Repository: http://eprints.qut.edu.au/
QUT Digital Repository: http://eprints.qut.edu.au/ Alhaqbani, Bandar S. and Fidge, Colin J. (2007) Access Control Requirements for Processing Electronic Health Records. In ter Hofstede, A. and Benatallah,
More informationCAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,
More informationImplementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.
Implementation of Mandatory Access Control in Role-based Security System CSE367 Final Project Report Professor Steve Demurjian Fall 2001 Jin Ma Computer Science & Engineering The University of Connecticut
More informationCS 4803 Computer and Network Security
Access to general objects CS 4803 Computer and Network Security Memory protection is only one example Need a way to protect more general objects Before we begin, some design principles Alexandra (Sasha)
More informationDepartment of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
More informationAn Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
More information