USER ACCESS CONTROL AND SECURITY MODEL
|
|
|
- Marjorie Mosley
- 10 years ago
- Views:
Transcription
1 102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap Faculty of Computer Science and nformation Systems Universiti Teknologi Malaysia Jalan Semarak Kuala Lumpur Malaysia Telp: , Fax: Abstract: Securing information system becomes the highlight of technology following quick development ofcomputer networking and the nternet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of information system is the open connection system where users are able to access system from many places. t leads the involvement of user access control as a part of database security since it takes a big role in governing access request ofeach user. This security component serves as a part of defense to secure data contained in the system. Development of user access control began on the early ofseventies with DAC technology. Right now technology of user access control has reached sophisticated method with RBAC, but development of organization using information system and the development of information system itself push the improvement of user access control technology. This paper provides information about security system with the emphasis on user access control, which includes DAC, MAC and RBAC and the implementation of each user access control in security model. Comparison of each user access control method is given at the end ofthe paper. Keyword: Database Security, Security, User Access Control, Access Control 1. ntroduction n the recent development of computer and networking database security is facing a big challenges to protect information contained in the information system. There are a lot of possible event leads to security breach over a database, and therefore causing security violations. Security violation is the condition when the security mechanism fails to protect information contained in the system. (Krause et. a, 1997) classified security violations into three categories: a. mproper release of information, which has the relevancy with the reading process done by the unauthorized user. b. mproper modification of data, which includes information mishandling and modification by unauthorized user. c. Denial of service, which prevents user from using system resources or accessing data. Potential events causing security violation can be defined as a threat. (Khelalfa, 1997) classified the threat as accidental and intentional. The examples of accidental threat are natural disasters, human errors and the errors in the hardware and software of computer. On the other hand, the intentional threat can be called as an attack as it is done intentionally by somebody or an organization to offence an information system that brings the dangerous condition to that,system. The examples of this threat are a hostile agent that modifies the data of the database improperly and the user who abuse his privileges.
2 103 There are three aspects that must be considered in conducting security over a database. These aspects are secrecy, integrity and availability. Secrecy is the protection from improper information disclosure. This protection prevents unauthorized user getting the information by direct retrieval or logical inference,(indirect retrieval). ntegrity is the protection from improper modification of information. The forbidden events are "append" and "write" access to database by unauthorized user, insertion of false data and destruction of data. Availability is related with the availability of system resources and information, it means the information and system resources must always be available when the authorized user access them, and the system must not deny the operation or service run by the authorized user. The mechanisms to gain those security aspects are discussed in this paper with the emphasis on user access control and its implementation in the security model. The explanation of user access control technology that comprises DAC, MAC and RBAC will be given in the later section, whereas the capability of each method to cater organization requirement that consist of business and military environment will be discussed in the separate chapter. The remaining of this paper is organized as the following: Section 2 gives a brief explanation about each mechanism that is possible to be done in conducting security. Section 3 explains more about user access control method that consist of DAC, MAC and RBAC and how they work. Section 4 explains about security model to implement each user access control method. Section 5 gives a discussion on each access control technique by comparing each other, and the involvement of user access control in the organization will also be explained in this section. Conclusion of this paper containing proposed future research direction is given in section Security Control Security control is the effort to perform security over a database using a certain mechanism. (Denning, 1983) classified security control into: a. Flow control b. nference control c. Cryptographic control d. Access control Flow control governs information flowing from one security level to another security level (Sandhu, 1993). t prevents the flowing of information contained in an object into the less protected object. The information flowing can be happened explicitly, e.g. through a copy, or implicitly, e.g. through a hidden program such as Trojan horse and virus (Castano et. al, 1994; Mcl.ean, 1990). This control permits the flowing of information only if one of the two following condition satisfied, i.e. the source object and the destination object have the same protection level or the source object has the lower protection level than the destination object. nference control prevents the information disclosure done by unauthorized user who uses many ways of deduction (Khelalfa, 1997). The focus of this mechanism is to deter indirect detection to the information. Cryptographic control prevents the information to be understood by the unauthorized user (Menezes et. al, 1996). This mechanism converts the information into a different form of information using a certain way. Only the authorized users are able to understand the meaning of information. Access control manages and regulates the direct access to the information system. This mechanism performs security control based on the security policies supplied to the system. As it has the function to regulate the access request of each user, it deals with individual user registered in the system. n the system implementation, access control mechanism is enforced in the security model (McLean, 1994). Further description on the security model will be given in section 4. From this point, paper will focus more on the user access control and its mechanism.
3 Access Control Access control is the mechanism.to obtain security control over the database by governing the direct access to the information system based on the access policies supplied to the system (Sandhu and Samarati, 1994). Access control must ensure that every access to the system is occurred exclusively (Castano et. ai, 1994). The access control system comprises the following components: a. Subject is the active entities accessing system resources. Subject can be a user or a process, and the system must be protected from this component. b. Object is the passive entities that must be protected from getting the access by unauthorized subject. Object can be considered as the system resource. Access control can be classified into the following categories:. Discretionary Access Control (DAC) 2. Mandatory Access Control (MAC) 3. Role Based Access Control (RBAC) The explanation of those methods will be given in section 3.1, 3.2 and 3.3 respectively Discretionary Access Control (DAC) The DAC governs the access of the subject to the object based on the user's identity and authorization rules applied to the system (Pernul, 1995; Baraani-Dastjerdi et. ai, 1996). User's identity and authorization rules are used tc? specify the access rights owned by the user such as read, write, execute, open, close, etc. The architecture of DAC can be shown in the figure. Access Request Use r ' dentification Checker Privilege Checker Permitted Denied Figure 1. DAC architecture Every access request to the information system is passed through the user identification checker to define who made the request. After the user could be identified, the privileges checker compare the access request with the privilege list, which consist of the privileges belongs to each user. n here the decision whether the access is denied or permitted is made. The other 'characteristic of DAC is the condition that the users are permitted to have the privilege to propagate the access right of the object belongs to them to the other user (Pernul, 1995; McLean, 1990).
4 105 Due to its simplicity, DAC has been adopted in various systems such as UNX, AS/400 and Windows NT. n those systems, user is allowed to have its own files and to grant the permission of accessing those files to other users. Thus, user becomes the administrator of its own data Mandatory Access Control (MAC) The MAC governs the access of the subject to the object in the system based on the classification level owned by subject and object (McLean, 1990; Pernul, 1995; Baraani-Dastjerdi, 1996). This access control applies the tight mechanism and introduces multilevel data to manage and regulate the access request. Every subject and every object are assigned the security level based on how important the subject and how secret the object in the system (McLean, 1990; Sandhu and Samarati, 1994). The architecture of the MAC is depicted in the figure 2. Access Request ' ~ Use r dentification Checker Security Level Checker Pe rm i t t e d Denied Figure 2. MAC architecture Every access request is passed through user identity checker to recognize the user who makes the request. After the identification of user is known, then security level checker compares the security level of object being accessed and the security level of subject made an access based on the security level list. The output of security checker is the decision to permit or deny the access request.. Like the one proposed by Bell-LaPadula, security level can be classified into TS (top secret), S (secret), C (confidential) and U (unclassified) which the TS > S > C > U. Subject is permitted to access an object if security level of subject is greater or equal than the security level of object. f an object owns security level S, a subject that is allowed to access this object must have security level TS or S. Not many systems adopted this method. Assigning security level to every user and object in the system is not an easy task, especially for the big system that contains many users and data (Sandhu and Samarati, 1994). An example of the system that adopted this method is Sea View model (Castano et. a, 1994).
5 Role Based Access Control (RBAC) RBAC controls the access request of a subject to an object based on the roles that is supplied to the system. A role is the functions or transactions in which a user is permitted to perform within an organization (Ferraiolo and Kuhn, 1992). A tole can belong to an individual user or a group of users. The information contained in the role includes the separation of duties, responsibilities and qualifications of the user (Baraani-Dastjerdi et. a, 1996). The roles must be maintained and updated to follow any modification within the organization. Therefore if there are any modification in the organization such as a new user is added to the system, some users resign from the organization or some users are moved from one department to another, the system is still able to control access request to the database. Role maintenance and updating are the responsibilities of system administrator. The architecture of RBAC is depicted in figure 3. Access Request Use r ' ~ dentification Checker Role s Checker Permitted Denied Figure 3. RBAC architecture Every access request is passed through the user checker to recognize who issued the request. After the user made. the request is known, then the request is compared with the roles owned by the user to specify whether the request is permitted or denied. f the request satisfies the roles belong to the user, request will be permitted, otherwise it is denied. (Ferraiolo and Kuhn, 1992) specified the differences between RBAC and DAC as the followings: a. RBAC governs the access request based on the function of each user as a part of the organization, whereas DAC governs the access request based on the ownership of each object. b. DAC allows users to pass their privilege to the others, whereas RBAC does not allow this operation since the objects are owned by the organization and the users just follow their function in the organization. 4. Security Model As stated in section 2, security model is the mechanism to enforce access control method. The objective of security modeling is to produce a conceptual model based on the requirement that describe the protection need by the system (McLean, 1994). Since security model deals with
6 107 conceptual model, it must be freed from any constraint of the implementation such as software constraint, operating system constraint, hardware constraint, etc (Castano et. ai, 1994). With respect to user access control, security model can be categorized into three groups, i.e., discretionary security model, mandatory security model and role based security model. The same with access control system, security model also applied the same definition of subject and object. Subject is the active entities that access the object and object is the passive entities that must be protected Discretionary Security Model As stated in its name, this model aims to enforce DAC (Pernul, 1995), therefore the bases of this model are the users identity and the authorization rules supplied to the system. n this area, several models were proposed to formalize security mechanism under DAC. The first model appeared was access matrix model that was proposed by Lamson (1971) and extended by Graham and Denning (1972) and finally formalized by Harrison, Ullman and Ruzzo (1976). To represent security mechanism, this model uses a matrix. The matrix correlates subject, object and the authorization owned by subject to each object. f S is a set of subjects (active entities), is a set of objects (passive entities) and A is the authorization of subject to object, then the access matrix model can be shown in figure 4. S ubjects o 1 Objects o 2 o 3 A[s1,o1] A[s1,o2] A[s1,o3] A[s2,o1] A[s2,o2] A[s2,o3] S 1 S 2 S 3 A[s3,o1] A[s3,o2] A[s3,o3] Figure 4. Access matrix model As shown in figure 4, each row in the matrix represents a subject and each column represents an object. The authorization owned by each subject to each object represented by A[s,o] is the entity correlating a subject to an object. This entity denotes what subject can do to an object. Take an example on the relation of subject S1 and object. The possible access can be taken by subject S1 to object 01 is represented using A[S,O] in which it can comprises the predefined operation of subject to object such as read, write, grant, modify, etc. The other model in this area is Take-Grant model that was proposed by Jones (1976). This model is an extension of access matrix model, to represent the authorization this model uses a graph structure instead of a matrix. Figure 5 shows the mechanism applied in this model.
7 108 y x x r,w r,w z z Figure 5. Take-Grant model Figure 5 shows the step taken to grant the read access to object z. The grantor is x that has the grant access to object y and has the read and write access to object z, therefore x is capable to pass the read access to object z to subject y. n doing that operation, x takes his access right (in this case is the read operation) and sends it to y. After that, y instantly is able to access z using read operation, but y is still not able to write z before x or another user grant write operation to it Mandatory Security Model This model aims to enforce MAC (Pernul, 1995). The base of this model is the security classification of subject and object. Since this model deals with the multilevel data, it is called multilevel security. The two well-known and fully established models in this area are Bell LaPadula and Biba models. Bell-LaPadula model was proposed by Bell and LaPadula (1973, 1974a, 974b, 1975). To perform security mechanism, this model classifies security class to subject and object in the system, i.e., top secret (TS), secret (S), confidential (C) and Unclassified (U) which TS > S > C > U. Security classes is depicted in figure 6. s/o Top s~~~~~ s/o Secret _ s/o Confidential s/o Unclassified Figure 6. Security classes in Bell-LaPadula model lilid 12, Bi!. 2 ( Disember 2000 ) lurna1 Tekno1ogi Maklumat
8 109 Bell-LaPadula model imposes two axioms in handling multilevel data: a. The simple security property A subject cannot have the read access to an object which security class is higher than the security class of the subject (no read up). b. The *-property A subject has the write access to an object which security class is higher than or equal to the security class of the subject. t has the read access to an object which security class is lower than or equal to the security class of the subject. t has the read and the write access to the object which security class is equal to the security class of subject. f f(s) is the security level of subject and f(o) is the security level of object, then each access right can be represented as the following: Write: f(s):::;f(o) Read: f(s) ~ f(o) ReadWrite: f(s) =f(o) These axioms are shown in figure 7. With these axioms, this model aims to prevent unauthorized release of information by achieving information secrecy.,/f(o) {level n write uccesl level i + f(s). level i ==> reud/w rite ==> f(o). level i eve i- level ~ ' )reud a c c e ss l f( 0) J i: u n y nurn ber represents security c la s s Figure 7. Axioms of Bell-LaPadula model Biba model was proposed by Biba (1977) applies similar principles like Bell-LaPadula for protecting information integrity instead of secrecy. The security classes in this model are crucial (C), very important (V), important () and unclassified (U) which C > V > > U. Unlike Bell Lal'adula model which applies "no read up" operation, Biba model applies "no write up" operation. A subject cannot have a write access to an object which security class is higher than the security class of that subject (no write up). A subject cannot have the read access to an object which security class is lower than the security class of that subject (no read down). With these axioms this model aims to protect the system from unauthorized modification of information by achieving information integrity. The sea view model proposed by Denning (1987) combines both MAC and DAC. This model relies on two layers, i.e., MAC model and TCB (Trusted Computing Base) model. MAC model performs MAC and classifies an access class that has a secrecy component (secrecy class) and an integrity component (integrity class). The secrecy class in the model corresponds to the secrecy of Bell-LaPadula model, whereas the integrity class corresponds to the integrity class of Biba model. TCB model performs DAC and defines multilevel relations that are resulted from the classification of data in MAC model. The information in the TCB model is stored on the object
9 110 that is mediated by MAC model (Castano et. a, 1994). The components of the Sea View model can be shown in figure 8. Sea View model < _ S ecrecy MAC model model Bell-LaPadula ntegrity- Biba model TCB model... Discretionary Access Control Figure 8. The components of Sea View model 4.3. Role Based Security Model This model aims to perform RBAC. (Sandhu et. a, 1996) defined a family of four conceptual models that is known as RBAC96. This model comprises RBACO, RBAC1, RBAC2 and RBAC3. RBACO is the base model that specifies minimum requirement for the system that fully supports RBAC. The elements contained in RBACO are users, roles, permissions and sessions. Those components are the basis of Role-Based security model. RBAC and RBAC2 are based on the RBACO and add an independent feature to the model. The independent feature of RBAC 1 is the role hierarchies, which corresponds to the permission inheritance from the other roles. And the independent feature of RBAC2 is the constraint, which corresponds to the restriction of roles. RBAC3 consolidates all of those models, i.e., RBACO, RBAC and RBAC2. The complete architecture of RBAC96 is depicted in figure 9. ilid 12, Bil. 2 ( Disember 2000 ) urnal Teknologi Maklumat
10 Role Hierarchy UserAssignment P~rmission Assignment t, +, Constraints,,,,,,, Figure 9. The complete architecture of Role Base Security model. As stated earlier in this section the basics components constructing the model are user, role, permission and session. These components build the base model (RBACO) and denoted by U, R, P and S respectively. User is the active entities use the system resources, usually user is a human being. Role is a job function that is done by users within the organization as explained in section Permission is the access right to one or more objects in the system. The relations that appeared in the system are user assignment and permission assignment. User assignment connects users and roles. This relation can be defined as many to many relations and represented by: UA c U x R (1) as a user can have many roles and a role can belong to many users. Permission assignment connects roles and permissions and it is also many to many relations and represented by: PA c P x R (2) as a role can contain some permission and permission can be used by many roles. n this model, users do not directly get the permission to access objects, the permission will be derived through a role. With this method, access request can be controlled and arranged based on the function of the user within the organization.. The session is directly established during the user active in the system. Each session is associated with a single user, and considers that a single user can have many roles. The representations of this component are: S ~ U : a function mapping each session to the single user S ~ 2 R : a function mapping each session to a set of roles (3) (4) The other component appeared in this model are role hierarchies and constraint. Role hierarchies are used to structure the roles based on the organization structure. As stated earlier Jilid 12, Bil. 2 (Disember 2000)
11 112 this component is used in RBAC and RBAC3. Role hierarchies consider the authorization and the responsibilities of the users within the organization. Tne example of role hierarchies is depicted in figure 10, which represents the relation of roles contained in Accounting department. Accounting Manager Account Payable Account Receivable -. Accounting Employee Figure 10. Role hierarchies Constraint is used in RBAC2 and RBAC3. This component is used to apply more restriction to the system and to perform organization' policy. For instance, most organization will not allow the same user having the roles of purchasing manager and the roles of account payable manager since such permission can lead to the fraudulent dealings. Constraint can be used to restrict this permission by giving some condition to the roles and hence restrict the user from getting both roles. With respect to the figure 9 constraints can be applied to the user assignment, permission assignment and the session. The example of the constraint that is applied to the user assignment is the restriction, which the user is allowed to have only one role. t supports separation of duty. The constraint for permission assignment can be applied in the same manner like constraint applied for user assignment. For instance, the certain permission is allowed to be assigned to one role only. This method will support separation of duties, Constraint that is assigned to the session can be used to limit the number of session allowed for each user and the user can exercise the certain number of the roles only. 5. Discussion Various methods have been used to approach how the system governs the access on their resources. DAC and MAC have been used by the people from along time ago to formalize security mechanism on the information system. DAC is known for its flexibility in implementing security mechanism, therefore it can be applied in almost all of the information system (Sandhu and Samarati, ]994). But DAC has a significant drawback in conducting security mechanism since the permissions of each user are specified and granted by system administrator (Ferraiolo and Kuhn, ]994). t makes the system has a great dependencies on the system administrator rather than the organization guidelines, therefore it creates a bigger possibility that the privilege is granted to inappropriate user.
12 113 Moreover, DAC conducts security mechanism based on the ownership of each object, so the system allows users to own an object (Castano et. al, 1992; Mcl.ean, 1994). For the users who own an object, they have all of the privilege to access that object including the privilege for passing the permission of that object to the other user. t brings a difficult situation for the security administrator to monitor system security due to uncontrolled distribution of privileges. User who does not have any privilege to access an object, still be able to access that object by getting the privilege from the other user who pass this privilege to him without any permission from system administrator. Once the user has an access to the object, system will not filter the activity done by the user to that object (Sandhu and Samarati, 1994). t can lead the users to abuse their privileges, and the system will not be able to control the information flows among the objects. Moreover, the existence of Trojan horse program which has the ability to pass the user rights without the knowledge of user also brings a significant threat to the system (McLean, 1994). An effort to extend security on DAC has been conducted by (Sandhu, 1992) with Typed Access Matrix Model, which introduces strong typing on Access Matrix Model. But it could not omit the main drawback of DAC. Because of the vulnerability from the security breach, DAC is not suitable to conduct security mechanism over the military organization although it could be accepted in various information systems, mainly in the business organization. Military organization needs the high security assurance without compromising any risk that is possible to happen. For the military organization, MAC is more suitable than DAC since MAC offers more secure mechanism (Castano et. al, 1994; Sandhu and Samarati, 1994). n conducting security mechanism, MAC applies multilevel security labels to every subject and every object in the system. With this method MAC is able to control information flow in the system. But MAC delivers too rigid security mechanism. nstead for some military organization especially for the organization that has a large number of users and objects, it is not easy to give security label to every subject and every object in the system (McLean, 1990; Pernul, 1995; Sandhu and Samarati, 1994). n fact, the relation between user and object is conducted in many to many relations, it means a 'set of users deal with a set of objects. Thus, defining security label to each user and each object would bring a difficulty in updating and administering database. Moreover, the insertion of new user and new object in the system especially for those having a new security label cannot be done easily as it must consider the existing. The new assignment to the existing user also brings a significant difficulty in maintaining database. This drawback can influence the live cycle of data in the system. The method combining DAC and MAC had been proposed by Denning (1986) with the Sea View model. n this model, DAC is represented by the TCB model and MAC by the MAC model. TCB model is layered on the MAC model. Although this model is able to solve the problem of DAC in controlling information flows, this model still carries the problem of MAC in rigidity and DAC in the relation of user and object for the same security level. Considering business organization, it almost is impossible to apply MAC in its system. RBAC brings a new way in governing access control. This method relies on the function of each user within the organization represented by the roles, therefore it depends on the organization guidelines (Sandhu, 1997). The privileges owned by the user are limited by the roles belongs to the user. t makes the user will not be able to get more privileges than they need to do their job (Ferraiolo and Kuhn, 1992; Sandhu, 1997). Moreover, RBAC supports separation of duties for each user following the roles owned by the user. But this method has a drawback in handling multilevel data since the user is not connected directly to the access permission. The relation of user and permission is mediated by the roles. Therefore the definition of privileges by the roles will be resisted by the security level of subjects and objects. Although this method.delivers a good security mechanism for large organization in business environment, it makes RBAC not recommended for military organization. However it reduces the flexibility of RBAC. Jilid 12, an. 2 ( Disember 2000 )
13 114 The other drawback of RBAC is the incapability in controlling information flow. There is a possibility that the user get an inappropriate role by collaborating with system administrator. Once the user gets this role, he can access the data following the role without any restriction. The comparison of three-access control method can be shown in table 1. N 0 Table 1. Comparison of DAC, MAC and RBAC Security points DAC MAC RBAC 1. Basis of access request Authorization list Security level Role permission 2. System dependency on System administrator Classification level of subject and object Function of user within the organization 3. Distribution of Uncontrolled Controlled Controlled authorization 4. Object owner System and user System only System only 5. User capability to grant Permitted Prohibited Prohibited an access to the others 6. Control of information No Yes No flow 7. System maintenance and updating Easy Difficult Easy 6. Conclusions User access control govern the access request of each user in a certain method depend on the requirement of the system. There is no method better then the others. Each method has the specific strong points, on the other hand it also carries the weaknesses. To determine which access control is more suitable to be applied in the information system need the analysis on the requirement of the system. Currently information system is implemented following the organization structure. Whatever the type of that organization, whether it is a military or business, security must be applied to protect data in the system and the system itself. The flexible method as represented by DAC is easy to be adopted, but it does not guarantee that the security mechanism brings enough protection to the system due to the weaknesses of that method. On the other hand, the very tight protection as represented by MAC will bring difficulties in implementation and maintenance of the system itself. t even can leak the existence of the over all system. RBAC has the other approach in implementing security. t brings flexibility and on the other hand carries a more secure mechanism than DAC. However, it is still not adequate to be adopted for military organization. The idea of bringing flexibility to the military organization as well as bringing military security to the business organization still needs to be followed up. The integration of security method that can be applied in any system regardless it is a military or a business organization needs to be discovered in further research in order to cover the varying system Jilid 12, au. 2 ( Disember 2000 )
14 References 1. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini. Security in Databases: A Survey Study Bertino E and Ferrari E. Data Security. Proceedings on the Computer Software and Applications Conference Chandramouli Ramaswamy and Ravi Sandhu. Role-Based Access Control Features in Commercial Database Management Systems. Tn Proceedings ofntssc' David Ferraiolo and Richard Kuhn. Role Based Access-Control. Proceedings of 15 th National Computer Security Conference, David Ferraiolo, Janet Cugini and Richard Kuhn. Role Based Access-Control (RBAC): Features and Motivations. n Proceedings of u" Annual Computer Security Conference. December D.E. Denning. Cryptography and Data Security. Addison-Wesley Gunter Pernul. nformation Systems Security: Scope, State-of-the-art, and Evaluation of Techniques. nt. Journal of nformation Management, Vol. 15, No.3, Butterworth Heinemann, June Halim. M. Khelalfa. Computer Security nference Control. domainltunis97lcom 54lcom 54.html. May John McLean. A comment on the "Basic Security Theorem" of Bell and LaPadula. nformation Processing Letters John McLean. The Specification and Modeling of Computer Security. Computer, vol. 23, no. 1. January John McLean. Security Models. Encyclopedia ofsoftware Engineering (ed. John Marciniak), Wiley and Sons, nc Kioumars Yazdaniam and Frederic Cuppens. Neighborhood Data and Database. Security. Proceedings on the 1992-/993 ACM SGSAC on New Security Paradigm Workshop. August MD. Rafiqul slam. Design and Analysis of a Dynamic Access Control Scheme. Universiti Teknologi Malaysia PhD Thesis. April Micki Krause and Harold F. Tipton. Handbook of nformation Security Management. CRC Press LLC Mukesh Singhal and Nirajan G. Shivaratri. Advanced Concepts in Operating Systems: Distributed, Database and Multiprocessor Operating Systems. McGraw-Hill P. Ammann, S. Jajodia and 1. Ray. Ensuring Atomicity of Multilevel Transactions. Proceedings ofthe EEE Symphosium on Research in Security and Privacy Ravi S. Sandhu. The Typed Access Matrix Model. Proceedings of EEE Symposiums on Security and Privacy, Oakland, California, May 4-6, Ravi S. Sandhu. Lattice-Based Access Control Models. TEEE Computer, Volume 26, Number 11, November Ravi Sandhu. Role-Based Access control. Proceedings of to' Annual Computer Security Applications Conference Ravi S. Sandhu and Pierangela Samarati. Access Control: Principles and Practice. EEE Communications Magazine, September Ravi Sandhu. Role-Based Access Control: A Multi-Dimensional View. Proceedings on io: Annual Computer Security Applications Conference. December Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman. Role-Based Access Control Models. EEE Computer, Volume 29, Number 2, February Ravi Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls. Proceedings Fourth European Symposium on Research in computer Security. September 25 27, Jilid 12, Bi. 2 ( Disember2000 )
15 Ravi Sandhu, Venkata Bhamidipati. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline. Proceedings ~f Second ACM Workshop on Role Based Access Control Ravi Sandhu. Role Activation Hierarchies. Proceedings of3,d ACM Workshop on Role-Based Access Control, Fairfax, Virginia, October 22-23, S. Jajodia. Database Security and Privacy. ACM Computing Surveys so" Anniversary Commemorative ssue. March Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati. Database Security. Addison Wesley Thomas Y. C. Woo and Simon S. Lam. Authorization in distributed Systems: A Formal Approach. Proceedings ofthe EEE Conference on Security and Privacy Vijay Atluri, Sushil Jajodia, Tom Keefe, Cathy McCollum and Ravi Muhkamala. Multilevel Secure Transaction Processing: Status and Prospects. Database security X: Status and Prospects Jilid 12, Bil. 2 ( Disember 2000)
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Part III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES
82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
Welcome to Information Systems Security (503009)
Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Course Outline Week Lectures 1 Information systems security: basic
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
DATABASE SECURITY MECHANISM
DATABASE SECURITY MECHANISM Dorin Iordache Lecturer eng., Romanian Naval Academy Mircea cel Bătrân Fulgerului nr.1, Constanta, 8700, Romania email: [email protected] Abstract Database security was and
DISCRETIONARY ACCESS CONTROL. Tran Thi Que Nguyet Faculty of Computer Science & Engineering HCMC University of Technology [email protected].
DISCRETIONARY ACCESS CONTROL Tran Thi Que Nguyet Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Outline 1 2 3 4 Introduction to Discretionary Access
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Database Security Sabrina De Capitani di Vimercati, Dip. Elettronica, Universita di Brescia, 25123 Brescia, Italy Pierangela Samarati, Dip. di Tecnologie dell'informazione, Universita di Milano, 26013
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
What is a secret? Ruth Nelson
What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
An Application of Integrating Role and Lattice Based Access Control in Database Engineering
An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
How Can Data Sources Specify Their Security Needs to a Data Warehouse?
How Can Data Sources Specify Their Security Needs to a Data Warehouse? Arnon Rosenthal The MITRE Corporation [email protected] Edward Sciore Boston College (and MITRE) [email protected] Abstract In current warehouse
INFO/CS 330: Applied Database Systems
INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke [email protected] http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
Firewalls. Mahalingam Ramkumar
Firewalls Mahalingam Ramkumar Evolution of Networks Centralized data processing LANs Premises network interconnection of LANs and mainframes Enterprise-wide network interconnection of LANs in a private
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
SELinux Policy Management Framework for HIS
SELinux Policy Management Framework for HIS by Luis Franco Marin (05592763) BSc., MIT This thesis is presented in fulfilment of the requirements of the degree of Master of Information Technology (Research)
Access Control. Dr George Danezis ([email protected])
Access Control Dr George Danezis ([email protected]) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional
Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.
Implementation of Mandatory Access Control in Role-based Security System CSE367 Final Project Report Professor Steve Demurjian Fall 2001 Jin Ma Computer Science & Engineering The University of Connecticut
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Security Architecture and Design
IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield Domain Overview Identify key principles and concepts critical to securing the infrastructure
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor
CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
CONCEPTUAL FRAMEWORK FOR GEOSPATIAL DATA SECURITY
CONCEPTUAL FRAMEWORK FOR GEOSPATIAL DATA SECURITY Sangita Zope- Chaudhari 1 and P. Venkatachalam 2 1 Research Scholar, Centre of Studies in Resources Engineering, Indian Institute of Technology Bombay,
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Security Implications of Distributed Database Management System Models
Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India E-mail: 1 [email protected], 2 [email protected],
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
The Future of Access Control: Attributes, Automation and Adaptation
Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 [email protected]
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
TRANSMAT Trusted Operations for Untrusted Database Applications
TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: [email protected] Abstract This paper presents a technique
Chapter 24. Database Security. Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Chapter 24 Database Security Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1 Introduction to Database Security Issues Types of Security Legal and ethical issues: privacy issues
