Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.

Size: px
Start display at page:

Download "Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001."

Transcription

1 Implementation of Mandatory Access Control in Role-based Security System CSE367 Final Project Report Professor Steve Demurjian Fall 2001 Jin Ma Computer Science & Engineering The University of Connecticut Storrs, CT

2 Contents Abstract 1. Introduction 2. Access Control Models 2.1 Mandatory Access Control (MAC) 2.2 Role-based Access Control (RBAC) 2.3 Combination of MAC and RBAC 3. Framework of Existing Role-based Security System 3.1 Software Architecture 3.2 The Unified Security Resource (USR) 4. Implementation 4.1 Modify Database Schema 4.2 Modify Resource Information 4.3 Modify Security System 4.4 Modify IDL 4.5 Modify GUI 4.6 Some ScreenShots 5. Conclusion and Future Work 6. Reference 1

3 Abstract Role-based access control has been introduced along with claims that its mechanisms are general enough to incorporate the traditional access control models: mandatory access control (MAC) and discretionary access control (DAC). This report provides a realization of mandatory access control in an existing role-based security system by labeling all users with clearances and all other data objects with classifications. Implementation steps are presented and future direction is discussed. 1. Introduction Role based access control (RBAC) has recently received considerable attention, particularly for commercial sectors. Under the RBAC framework, users are granted membership into roles based on their competencies and responsibilities in the organization. This simplifies the administration and management of privileges; roles can be updated without updating the privileges for every user on an individual base. Role-based Access is generally recognized as being the most flexible form of access control [4,5]. Traditional mandatory access control (MAC) is associated with military or sensitive national security information and incorporates the policy of onedirectional information flow in a lattice. Mac is not as flexible as RBAC, yet MAC features are often required in, for example, military operations, where the flexibility of RBAC is also beneficial. Since the introduction of RBAC, researchers have discussed the relationship between RBAC and these traditional models [4] and attempted approaches on configuring RBAC to enforce MAC and DAC models. Nyanchama [2] proposes a number of access constraints that would realize the equivalent of Bell and LaPadula read- 2

4 down and write-up rules. Sandhu [8] attests the flexibility of RBAC and its ability to accommodate MAC policies by suitable configuration of role hierarchies and constraints. This paper introduces the implementation of mandatory access control in an existing role-based security system. In section 2, we will review the MAC and RBAC models. Section 3 discusses framework of the existing role-based security system. Section 4 presents the detailed implementation of MAC in a RBAC system. Section 5 offers conclusion and future directions. 2. Access Control Models 2.1 Mandatory Access Control Mandatory access control, which, according to the United States Department of Defense Trusted Computer System Evaluation Criteria is a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (e.g. clearance) of subjects to access information of such sensitivity. Clearance is the security level to which and individual user or client can access information. This clearance is usually associated with a need to know requirement. We will use the following four security clearance values according to National Security Information: Top Secret (T): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security. Secret (S): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally serious damage to the national security. 3

5 Confidential (C)): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally damage to the national security. Unclassified (U): no security restriction Classification is the security level given to information based on policy, We will use the same classification levels used for clearances to assign classifications. Clearance and classification go together, in that, a user s clearance is a limit to the access of information based on the information s classification. Classification relation is null < U < C < S < T. Each security level is said to dominate itself and all others below it in this hierarchy. The concept of mandatory access control was first formalized by Bell and LaPadula Model [4, 7]. The Bell-LaPadula Model supports mandatory access control by determining the access rights from the security levels associated with subjects and objects. The following two rules define the mandatory access: Simple-security property (ss-property): A subject can read an object only if the security level of the subject is higher or equals to the security of the object (readdown) *.property: A subject can write on an object only if the security level of the object is higher or equals to the security level of the subject. (write up) MAC policy compares the sensitivity label at which the user is working to the sensitivity label of the object being accessed and refuses access unless certain MAC checks are passed. It is usually assumed that the security labels on subjects and objects, once assigned, cannot be changed (except by the security administrator). This assumption 4

6 is known as tranquility[6]. This is the reason that MAC is mandatory. With mandatory controls, only administrators and not owner of resources may make decisions that bear on or derive from policy. Only an administrator may change the category of a resource, and on one may grant a right of access that is explicitly forbidden in the access control policy. MAC requires all those who create, access and maintain information to follows rules set by administrator. 2.2 Role-based Access Control RBAC regulates a user s access to certain resources based on a user role. A user role is a collection of permissions the user needs to accomplish that role. A user may have multiple roles, with each role having a set of permissions. The major advantage of role-based system is flexibility[1,9]. Role-based approach to protection and management of system privilege offers more flexibility than other systems such as multilevel security (the most common approach of MAC) and DAC, while proving similar levels of protection for objects in a system. In role-based applications, a user s access rights can be varied via different means. For instance, revoking a user s authorization to a role takes away the privileges in that role from the user. Fine-grained privilege management can be realized by removing/adding privileges associated with a given role. Another advantage of role-based system relates to the granularity of system privilege management. Given that system privileges can be as fine-grained as one can choose, roles offer a means for their incremental management. 5

7 2.3 Combination of MAC and RBAC Role-base access control eases the administration of privileges due to the flexibility with which roles can be configured and reconfigured. With roles, we can enforce the principle of least privilege where a role is assigned only sufficient functionality to realize the intended duty requirements [2]. Traditional role-based security finds application in environments where the greater concern is information integrity as opposed to secrecy [2]. Yet this does not preclude the exploitation of the advantages of role-based protection to realize secrecy. With additional rules on update and read operations, and the information they access, we can realize the requirements of mandatory access control, or MAC. It s out intention to demonstrate that a MAC-like level of protection can be realized using role-based security. 3. Framework of Existing Role-based Security System 3.1 Software Architecture In Figure 1, we represent the security-related clients and resources that comprise our new system architecture. We have a Unified Security Resource (USR), which provides role-based security support in Distributed Resource Environment (DRE). USR provides four categories of services: 1. Security Policy Services define user roles (UR s), register the resources, services and methods, and grant access to roles for resources, services and/or methods. Security Policy Services also include several methods that are provided for resource servers to publish themselves, their services and methods. 6

8 2. Security Authorization Services are utilized to maintain profiles on the clients (e.g. users, tools, software agents, etc.) that are authorized and actively utilizing nonsecurity services. These services allow a security officer to grant users to roles. 3. Security Registration Services are utilized by clients at start-up time for identity registration (User id, IP address and user role). 4. Security Tracking and Analysis Services are utilized by the security officers to dynamically trace the activities in the security environment and statically analyze the inner method calls of the resource server. Security Policy Client (SPC) Security Authorization Client (SAC) Global Clock Resource (GCR) Unified Security Resource (USR) Security Policy Services Security Authorization Services Security Registration Services Analysis Client Security Tracking and Analysis Java Client Software Agent Wrapped Resource for Legacy Application Lookup Legacy Client Database Client COTS Client Lookup Service General Resource Wrapped Resource for Database Application Wrapped Resource for COTS Application Service Figure 1: Security Clients and Resources in Distributed Environment. The prototype of our system has a USR and three resource systems, Global Clock Resource, Course Database Resource and the Patient Database Resource. Global Clock is a time server that is used to make sure database entries are entered in the proper sequence in a distributed environment. The Course Database Resource comes with a server and a client. In the server, we have three services: Query Services, Registration Service and 7

9 Update Service. Each of these services has a couple of methods. The Course Database Resource Client is used to access USR for registering clients and accessing Course Database Server for actions. The Patient Database Resource comes with a server and a client. In the server, there are three services: Query Services, Update Service and Membership Service. Each of these services has a couple of methods. The Patient Database Resource Client is used to access USR for registering clients and accessing Patient Database Server for actions. 3.2 The Unified Security Resource (USR) The Unified Security Resource (USR) is a repository for all static and dynamic security information on roles, clients, resources, authorizations, etc., and is organized into a set of services, as given in Figure 2. Register Service Register_Resource(R_Id); Register_Service(R_Id, S_Id); Register_Method(R_Id, S_Id, M_Id); Register_Signature(R_Id, S_Id, M_Id, Signat); UnRegister_Resource(R_Id); UnRegister_Service(R_Id, S_Id); UnRegister_Method(R_Id, S_Id, M_Id); Unregister_Token(Token) Query Privileges Service Query_Resource(); Query_Method(R_Id); Query_MethodDesc(Token, R_Id, S_Id, M_Id); Check_Privileges(Token, R_Id, S_Id, M_Id, ParamValueList); User Role Service Create_New_Role(UR_Name, UR_Disc, UR_Id); Delete_Role(UR_Id); Query_Role(UR_Id) SECURITY AUTHORIZATION SERVICES Authorize Role Service Grant_Role(UR_Id, User_Id); Revoke_Role(UR_Id, User_Id); Client Profile Service Verify_UR(User_Id, UR_Id); Query_Client(User_Id); Erase_Client(User_Id); Find_Client(User_Id); Find_All_Clients(); SECURITY POLICY SERVICES Figure 2: The Services of USR. Constraint Service DefineTC(R_Id, S_Id, M_Id, SC); DefineSC(R_Id, S_Id, M_Id, SC); CheckTC(UR_Id, R_Id, S_Id, M_ID, CheckSC(UR_Id, R_Id, S_Id, M_ID, ParamValueList); Grant-Revoke Service Grant_Resource(UR_Id, R_Id); Grant_Service(UR_Id, R_Id, S_Id); Grant_Method(UR_Id, R_Id, S_Id, M_Id); Grant_SC(UR_Id, R_Id, S_Id, M_Id, SC); Grant_TC(UR_Id, R_Id, S_Id, M_Id, TC); Revoke_Resource(UR_Id, R_Id); Revoke_Service(UR_Id, R_Id, S_Id); Revoke_Method(UR_Id, R_Id, S_Id, M_Id); Revoke_SC(UR_Id, R_Id, S_Id, M_Id, SC); Revoke_TC(UR_Id, R_Id, S_Id, M_Id, TC); SECURITY REGISTRATION SERVICES Register Client Service Create_Token(User_Id, UR_Id, Token); Register_Client(User_Id, IP_Addr, UR_Id); UnRegister_Client(User_Id, IP_Addr, UR_Id); IsClient_Registered(Token); Find_Client(User_Id, IP_Addr); SECURITY TRACKING AND ANALYSIS SERVICES Tracking Service Logfile(Log String) Analysis Service Analyze(Java Class File) 8

10 Security Policy Services are utilized to define, track, and modify user roles, to allow resources to register their services and methods (and signatures), and to grant/revoke access by user roles to resources, services, and/or methods with optional time and signature constraints. Security Authorization Services are utilized to maintain profiles on the clients (e.g., users, tools, software agents, etc.) that are authorized and actively utilizing nonsecurity services, allowing a security officer to authorize users to roles with or without time constraints. Security Tracking and Analysis Services are utilized to dynamically track all the activities in the security environment and to statically analyze the inner method calls of the resource system. 4. Implementation We implemented mandatory access control in Patient DB using CORBA. Application (here Patient DB) predefines the security classification (T, S, C, U) for resource, service and method. We define the lowest security level of methods as the service classification level, and the lowest security level of services as the resource classification level. A classification level is assigned to a role when created. And a clearance level is assigned to a user when created. When granted a role, the user should have the equal or higher clearance than the role. 4.1 Modify Database Schema The bolded columns are added to the database table to hold on the security classification or clearance information. 9

11 table users (user_id, passwd, begin_time, end_date, end_time, description, clearance) table role (role_id, description, classification) table res (res_id, begin_date, begin_time, end_date, end_time, description, classification) table service (res_id, service_id, service_name, description, classification) table method (res_id, method_id, method_name, description, classification) table availres(res_id,begin_date,begin_time,end_date, end_time, description, classification) table availservice (res_id, service_id, service_name, description, classification) table availmethod (res_id, method_id, method_name, description, classification) 4.2 Modify Resource Information PDBSourceID.java: assign security classification to resource, service, and method. Unclassified: PatientDB Resource Unclassified: Query Service Classified: Update Service Unclassified: Membership Service Top Secret: writeprescription(), getpresctiption; Secret: getmedicalhistory(), writediagnosis(), getdiagnosis(); Classified: getpaymentmod(), setpaymentmode(); Unclassified: addpatien(), removepatient(), getpatientlist(); PDBCorbaImpl.java: need to modified the parameters of related methods. For example, the bolded column is newly added. _security.resourceregister(pdbresourceid.patient_db_res_name, PDBResourceID.PATIENT_DB_RESOURCE_DESCRIPTION, PDBResourceID.PATIENT_DB_RESOURCE_CLAS); Note: we did not start University Database during the demo because hui only implemented snapshop on PDB. My part could work with University Database also. UDBSourceID.java: assign security classification to resource, service, and method. UDBCorbaImpl.java: need to modified the parameters of related methods. For example, the bolded column is newly added. 4.3 Modify Security System 10

12 SecurityDelegate.java: modify all methods which has parameter changes or the SQL statement querys table which adds new column. SecurityCorbaImpl.java: add following new methods. public String queryresourceclas(string resourceid); public String queryserviceclas(string resourceid, String servicename); public String querymethodclas(string resourceid, int methodid); public String[] queryavailserviceclass(string resourceid); public String[] queryavailmethodclass(string resourceid); public String[] queryregisteredmethodclass (String resourceid); public String[] queryservicemethodclass (String resourceid,in wstring serrviceid); public String[] queryregisteredserviceclass (String resourceid); public String[] queryregisteredresourceclass(); public String queryroleclas (String roleid); public String queryuserclearance (String userid); SecurityCorbaImpl.java: Modify the hasclientright Method to check for MAC after token check 4.4 Modify IDL Add following IDL code to securityserver.idl wstring queryresourceclas(in wstring resourceid); wstring queryserviceclas(in wstring resourceid, in wstring servicename); wstring querymethodclas(in wstring resourceid, in long methodid); seq1_string queryavailserviceclass( in wstring resourceid); seq1_string queryavailmethodclass( in wstring resourceid); seq1_string queryregisteredmethodclass (in wstring resourceid); seq1_string queryservicemethodclass (in wstring resourceid,in wstring serrviceid); seq1_string queryregisteredserviceclass (in wstring resourceid); seq1_string queryregisteredresourceclass(); wstring queryroleclas (in wstring roleid); wstring queryuserclearance (in wstring userid); 4.4 Modify GUI Modify GUI code to allow a security admin to enter classifications for roles, and clearances for users. Modify every GUI tab to allow classification (clearance) information appropriately displayed, and check for MAC. AddMethodToServiceTab.java CreateRoleTab.java GrantIPTab.java 11

13 GrantMethodTab.java GrantResourceTab.java GrantServiceTab.java QueryResourceTab.java QueryRoleTab.java RegisterMethodTab.java RegisterResourceTab.java RegisterServiceTab.java CreateUserTab.java EraseUserTab.java GrantRoleTab.java QueryUserTab.java Modify RefreshThread.java in both Policy and Authorization GUI to make sure the GUI tabs are updated appropriately. 4.5 Some Screenshots When Patient DB server starts, the predefined classification information is loaded. Available resource is displayed with appropriate classification level. 12

14 13

15 Since we use the lowest level of all methods classification as the security level of the service, a method with lower level than the service cannot be added to that service. Query resource result is displayed with classification level. 14

16 Role doctor is created with Top Secret classification. 15

17 Method cannot be granted to the role because its classification level is higher than that of the role. 16

18 User hui is created with Top Secret clearance. 17

19 A lower level user cannot be granted higher level role. 5. Conclusion and Future Work We implemented a realization of mandatory access control in an existing rolebased security system by labeling all users with clearances and all other data objects with classifications. Our approach is to treat clearances and classifications as constraints and it fact, that is what they are. A practical consequence is that it might be better to develop systems that support general RBAC and specialize these to MAC. It is also practical to build rules for adjustment. 18

20 6. Reference 1. Nyanchama, M. & Osborn, S Role-Based Security: Pros, Cons & Some Research Directions. ACM SIGSAC Review, 2(2): 11-17, June Nyanchama, M. & Osborn, S Modeling mandatory access control in role-based security systems. In proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands, Osborn, S Mandatory access control and role-based access control revisited. ACM Trans. Inf. Syst. Secur. 1, 2(Feb.), Osborn, S., Sandhu, R., and Nunawer, Q. Configuring Role-Based Access Control To Enforce Mandatory And Discretionary Access Control Policies. ACM Trans. Info. Syst. Security, 3, 2, Philips, C.E., Ting, T.C. and Demurjian, S.A. Information Sharing and Security in Dynamic Coalitions 6. Sandhu, R.S Lattice-based access control models. IEEE Computer 26, 11, Sandhu, R. S.and Samarati, P Access control: Principles and practice. IEEE Commun. Mag. 32, 9, Sandhu, R.S Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G.Martella, And E. Montoliva, Eds. Springer-Verlag, New York, NY, Sandhu, R.S., Coyne, E.J., Feinstein, H.L., and Youman, C.E. Role-based access control models. Computer, 29:38-47, Feb

Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill

Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa

More information

Security System for Patient DB

Security System for Patient DB Security System for Patient DB Final report for CSE367 Fei Gao, Dan Wang and Jin Ma Computer Science & Engineering The University of Connecticut Storrs, CT 06269-3155 {fgao, dwang, jinma}@engr.uconn.edu

More information

Role Based Access Control (RBAC) Nicola Zannone

Role Based Access Control (RBAC) Nicola Zannone Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access

More information

CHAPTER 22 Database Security Integration Using Role-Based Access Control

CHAPTER 22 Database Security Integration Using Role-Based Access Control CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 svlvia@csd.uwo.ca

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 thomsen@securecomputing.com

More information

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright.

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright. Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright.edu 937-775-5119 Goals of DB Security Integrity: Only authorized users should be

More information

Role-based access control. RBAC: Motivations

Role-based access control. RBAC: Motivations Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

How To Model Access Control Models In Cse543

How To Model Access Control Models In Cse543 CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Access Control Intro, DAC and MAC. System Security

Access Control Intro, DAC and MAC. System Security Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying

More information

CSE543 - Introduction to Computer and Network Security. Module: Access Control

CSE543 - Introduction to Computer and Network Security. Module: Access Control CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration

More information

Identity Management and Access Control

Identity Management and Access Control and Access Control Marek Rychly mrychly@strathmore.edu Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152 Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD

More information

Role-Based Access Control Features in Commercial Database Management Systems Chandramouli Ramaswamy and Ravi Sandhu Computer Security Division, ITL Info. and Software Engg. Dept., MS 4A4 NIST, Gaithersburg,

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

Security Models: Past, Present and Future

Security Models: Past, Present and Future Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com

More information

Enhancing UML to Model Custom Security Aspects

Enhancing UML to Model Custom Security Aspects Enhancing UML to Model Custom Security Aspects [Position Paper] Jaime Pavlich-Mariscal, Laurent Michel, and Steven Demurjian Department of Computer Science & Engineering, The University of Connecticut,

More information

SECURITY ASSURANCE FOR A RESOURCE-BASED RBAC/DAC/MAC SECURITY MODEL. Charles Edward Phillips, Jr., Ph.D. University of Connecticut, 2004

SECURITY ASSURANCE FOR A RESOURCE-BASED RBAC/DAC/MAC SECURITY MODEL. Charles Edward Phillips, Jr., Ph.D. University of Connecticut, 2004 SECURITY ASSURANCE FOR A RESOURCE-BASED RBAC/DAC/MAC SECURITY MODEL Charles Edward Phillips, Jr., Ph.D. University of Connecticut, 2004 The day-to-day operations of corporations and government agencies

More information

Incorporating database systems into a secure software development methodology

Incorporating database systems into a secure software development methodology Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic

More information

How to do Discretionary Access Control Using Roles*

How to do Discretionary Access Control Using Roles* How to do Discretionary Access Control Using Roles* Ravi Sandhu and Qamar Munawer Laboratory for Information Security Technology and Information and Software Engineering Department George Mason University

More information

INFO/CS 330: Applied Database Systems

INFO/CS 330: Applied Database Systems INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke johannes@cs.cornell.edu http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be

More information

Keywords: Security; data warehouse; data mining; statistical database security; privacy

Keywords: Security; data warehouse; data mining; statistical database security; privacy Security in Data Warehouses By Edgar R. Weippl, Secure Business Austria, Vienna, Austria Favoritenstrasse 16 1040 Wien Tel: +43-1-503 12 80 Fax: +43-1-505 88 88 E-mail: eweippl@securityresearch.at Keywords:

More information

An Application of Integrating Role and Lattice Based Access Control in Database Engineering

An Application of Integrating Role and Lattice Based Access Control in Database Engineering An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics

More information

Part III. Access Control Fundamentals

Part III. Access Control Fundamentals Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC

More information

COSC344 Database Theory and Applications. Lecture 23 Security and Auditing. COSC344 Lecture 23 1

COSC344 Database Theory and Applications. Lecture 23 Security and Auditing. COSC344 Lecture 23 1 COSC344 Database Theory and Applications Lecture 23 Security and Auditing COSC344 Lecture 23 1 Overview Last Lecture Indexing This Lecture Database Security and Auditing Security Mandatory access control

More information

Database Security. Chapter 21

Database Security. Chapter 21 Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should

More information

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control. ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,

More information

Tools to Support Secure Enterprise Computing

Tools to Support Secure Enterprise Computing Tools to Support Secure Enterprise Computing Myong H. Kang, Brian J. Eppinger, and Judith N. Froscher Information Technology Division Naval Research Laboratory Abstract Secure enterprise programming is

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2004 Vol. 3, no. 3, March-April 2004 L n RBAC: A Multiple-Levelled Role- Based Access

More information

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Access Control Models Part I. Murat Kantarcioglu UT Dallas UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:

More information

Information Flows and Covert Channels

Information Flows and Covert Channels Information Flows and Covert Channels Attila Özgit METU, Dept. of Computer Engineering ozgit@metu.edu.tr Based on: Mike McNett s presentation slides CENG-599 Data Security and Protection Objectives Understand

More information

Extended RBAC Based Design and Implementation for a Secure Data Warehouse

Extended RBAC Based Design and Implementation for a Secure Data Warehouse Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas bhavani.thuraisingham@utdallas.edu Srinivasan Iyer The University of Texas

More information

Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe. Module 8:Access Control and Authentication

Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe. Module 8:Access Control and Authentication Security and Cryptography 1 Stefan Köpsell, Thorsten Strufe Module 8:Access Control and Authentication Disclaimer: large parts from Stefan Katzenbeisser, Günter Schäfer Dresden, WS 14/15 Reprise from the

More information

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...

More information

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology

More information

ITM661 Database Systems. Database Security and Administration

ITM661 Database Systems. Database Security and Administration ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,

More information

SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES

SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES 82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS

More information

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21 Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed

More information

Polyinstantiation in Relational Databases with Multilevel Security

Polyinstantiation in Relational Databases with Multilevel Security Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: andro.galinovic@king-ict.hr Vlatka Anton i University

More information

Computer security Lecture 3. Access control

Computer security Lecture 3. Access control Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very

More information

Role Based Access Control: Adoption and Implementation in the Developing World

Role Based Access Control: Adoption and Implementation in the Developing World Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University

More information

Administration of Access Control in Information Systems Using URBAC Model

Administration of Access Control in Information Systems Using URBAC Model JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 89-109 Administration of Access Control in Information Systems Using URBAC Model Aneta Poniszewska-Marańda Institute of Information Technology

More information

USER ACCESS CONTROL AND SECURITY MODEL

USER ACCESS CONTROL AND SECURITY MODEL 102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap (crysdian@yahoo.com, harihodn@itp.utm.my, mohdnoor@fsksm.utm.my) Faculty of Computer Science and nformation

More information

Security Enhanced Linux and the Path Forward

Security Enhanced Linux and the Path Forward Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary

More information

An Improved Administration Method on Role-Based Access Control in the Enterprise Environment

An Improved Administration Method on Role-Based Access Control in the Enterprise Environment JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 921-944 (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer

More information

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

Database Security and Authorization

Database Security and Authorization Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,

More information

Components- Based Access Control Architecture

Components- Based Access Control Architecture Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University

More information

Access Control Matrix

Access Control Matrix Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object

More information

Purpose-Centric Secure Information Sharing

Purpose-Centric Secure Information Sharing Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu

More information

Analysis of Different Access Control Mechanism in Cloud

Analysis of Different Access Control Mechanism in Cloud Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Outline. INF3510 Information Security University of Oslo Spring 2015. Lecture 9 Identity Management and Access Control. The concept of identity

Outline. INF3510 Information Security University of Oslo Spring 2015. Lecture 9 Identity Management and Access Control. The concept of identity INF50 Information Security University of Oslo Spring 05 Outline Identity and access management concepts Identity management models Access control models (security models) Lecture 9 Identity Management

More information

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System

More information

OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project. Presented to the faculty of the Department of Computer Science

OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project. Presented to the faculty of the Department of Computer Science OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project Presented to the faculty of the Department of Computer Science California State University, Sacramento Submitted in partial

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

Implement role based access control with attribute certificates

Implement role based access control with attribute certificates Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany zhouwei48@hotmail.com Christoph Meinel Computer Science Department

More information

Role-based Authorization Constraints Specification Using Object Constraint Language

Role-based Authorization Constraints Specification Using Object Constraint Language Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte gahn@uncc.edu Michael. E. Shin

More information

Information Security Information & Network Security Lecture 2

Information Security Information & Network Security Lecture 2 1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term 2 Security Policies 3 Introduction So you ve succeeded as SO in convincing people

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

Role Based Access Control

Role Based Access Control Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!

More information

Role-Based Access Controls

Role-Based Access Controls Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards

More information

A Framework for Composable Security Definition, Assurance, and Enforcement

A Framework for Composable Security Definition, Assurance, and Enforcement A Framework for Composable Security Definition, Assurance, and Enforcement J. A. Pavlich-Mariscal Advisors: S. A. Demurjian and L. D. Michel Department of Computer Science & Engineering The University

More information

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object

More information

Apache Sentry. Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com

Apache Sentry. Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com Apache Sentry Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture

More information

Introduction to IT Security

Introduction to IT Security Marek Rychly mrychly@strathmore.edu Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,

More information

Lecture 14 Towards Trusted Systems Security Policies and Models

Lecture 14 Towards Trusted Systems Security Policies and Models Lecture 14 Towards Trusted Systems Security Policies and Models Thierry Sans 15-349: Introduction to Computer and Network Security domains Definition of MAC MAC (Mandatory Access Control) A set of access

More information

Towards Securing APIs in Cloud Computing

Towards Securing APIs in Cloud Computing Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&

More information

Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)

Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC) International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)

More information

INF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang INF3510 Information Security University of Oslo Spring 2012 Lecture 8 Identity and Access Management Audun Jøsang Outline Identity and access management concepts Identity management models Access control

More information

Decentralized user group assignment in Windows NT q

Decentralized user group assignment in Windows NT q The Journal of Systems and Software 56 (2001) 39±49 www.elsevier.com/locate/jss Decentralized user group assignment in Windows NT q Gail-Joon Ahn a, *, Ravi Sandhu b a Laboratory for Information Security

More information

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema

More information

Database Security Part 7

Database Security Part 7 Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino bertino@cs.purdue.edu Discretionary Access Control (DAC) No precise definition Widely used in modern operating

More information

Security Implications of Distributed Database Management System Models

Security Implications of Distributed Database Management System Models Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India E-mail: 1 Sunil1977.dce@gmail.com, 2 seetha.venkat80@gmail.com,

More information

INF3510 Information Security University of Oslo Spring 2016. Lecture 9 Identity Management and Access Control

INF3510 Information Security University of Oslo Spring 2016. Lecture 9 Identity Management and Access Control INF3510 Information Security University of Oslo Spring 2016 Lecture 9 Identity Management and Access Control University of Oslo Spring 2016 Outline Identity and access management concepts Identity management

More information

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema

More information

Mandatory Access Control

Mandatory Access Control CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism

More information

Chapter 8 A secure virtual web database environment

Chapter 8 A secure virtual web database environment Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services

More information

HP Quality Center. Upgrade Preparation Guide

HP Quality Center. Upgrade Preparation Guide HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth

More information

Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines

Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines Research Journal of Applied Sciences, Engineering and Technology 7(18): 3786-3790, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: October 26, 2013 Accepted: December

More information

Customer Bank Account Management System Technical Specification Document

Customer Bank Account Management System Technical Specification Document Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6

More information

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory

More information

A patient privacy centric access control model for EHR systems. Mario Sicuranza*, Angelo Esposito and Mario Ciampi

A patient privacy centric access control model for EHR systems. Mario Sicuranza*, Angelo Esposito and Mario Ciampi Int. J. Internet Technology and Secured Transactions, Vol. 5, No. 2, 2014 163 A patient privacy centric access control model for EHR systems Mario Sicuranza*, Angelo Esposito and Mario Ciampi Institute

More information

Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6

Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6 Trusted RUBIX TM Version 6 Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform Revision 6 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr

More information

Enterprise Access Control Patterns For REST and Web APIs

Enterprise Access Control Patterns For REST and Web APIs Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

A Security Domain Model for Implementing Trusted Subject Behaviors

A Security Domain Model for Implementing Trusted Subject Behaviors A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin Naval Postgraduate School, Computer Science Department, 1411 Cunningham

More information

An Empirical View of Database Security Measurements

An Empirical View of Database Security Measurements I J E E E C International Journal of Electrical, Electronics ISSN No. (Online): 2277-2626 and Computer Engineering 3(2): 107-112(2014) An Empirical View of Database Security Measurements Mohd Ahtesham

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

A Formal Enforcement Framework for Role-Based Access Control using Aspect-Oriented Programming

A Formal Enforcement Framework for Role-Based Access Control using Aspect-Oriented Programming A Formal Enforcement Framework for Role-Based Access Control using Aspect-Oriented Programming Jaime Pavlich-Mariscal, Laurent Michel and Steven Demurjian Department of Computer Science & Engineering,

More information

ACaaS: Access Control as a Service for IaaS Cloud

ACaaS: Access Control as a Service for IaaS Cloud ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu

More information

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, mqiu@vsu.edu Steve Davis, Clemson University, davis@clemson.edu ABSTRACT People considering improvements in database

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

What is a secret? Ruth Nelson

What is a secret? Ruth Nelson What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions

More information

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,

More information

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity

More information