Role-BasedAccessControl
|
|
|
- Jonah Day
- 9 years ago
- Views:
Transcription
1 Role-BasedAccessControl Proceedingsof15thNationalComputerSecurityConference,1992 NationalInstituteofStandardsandTechnology DavidFerraioloandRichardKuhn Gaithersburg,Maryland20899 Reprintedfrom thatrelianceondacastheprincipalmethodofaccesscontrolisunfoundedandinappropriateformanycommercialandciviliangovernmentorganizations.thepapeitaryapplications,discretionaryaccesscontrols(dac)areoftenperceivedasmeeting thesecurityprocessingneedsofindustryandciviliangovernment.thispaperargues WhileMandatoryAccessControls(MAC)areappropriateformultilevelsecuremil- Abstract describesatypeofnon-discretionaryaccesscontrol-role-basedaccesscontrol(rbac) 1Introduction TheU.S.governmenthasbeeninvolvedindevelopingsecuritytechnologyforcomputerand communicationssystemsforsometime.althoughadvanceshavebeengreat,itisgenerally perceivedthatthecurrentstateofsecuritytechnologyhas,tosomeextentfailedtoaddress -thatismorecentraltothesecureprocessingneedsofnon-militarysystemsthendac. theneedsofall.[1],[2]thisisespeciallytrueoforganizationsoutsidethedepartmentof Defense(DoD).[3] outofresearchanddevelopmenteortsonthepartofthedodoveraperiodoftwenty plusyears.todaythebestknownu.s.computersecuritystandardisthetrustedcomputer exclusivelyderived,engineeredandrationalizedbasedondodsecuritypolicy,createdto SystemEvaluationCriteria(TCSEC[4]).Itcontainssecurityfeaturesandassurances, information.theresultisacollectionofsecurityproductsthatdonotfullyaddresssecurity meetonemajorsecurityobjective-preventingtheunauthorizedobservationofclassied Thecurrentsetofsecuritycriteria,criteriainterpretations,andguidelineshasgrown securitymechanismshavebeenpartiallysuccessfulinpromotingsecuritysolutionsoutside issuesastheypertaintounclassiedsensitiveprocessingenvironments.althoughexisting ofamoreappropriatesetofcontrols. ofthedod[2],inmanyinstancesthesecontrolsarelessthenperfect,andareusedinlieu 1
2 (DAC)andMandatoryAccessControls(MAC).SincetheTCSEC'sappearanceinDecember (RBAC),thatcanbemoreappropriateandcentraltothesecureprocessingneedswithin of1983,dacrequirementshavebeenperceivedasbeingtechnicallycorrectforcommercial andciviliangovernmentsecurityneeds,aswellasforsingle-levelmilitarysystems.macis premiseofthispaperisthatthereexistsacontrol,referredtoasrole-basedaccesscontrol usedformulti-levelsecuremilitarysystems,butitsuseinotherapplicationsisrare.the TheTCSECspeciestwotypesofaccesscontrols:DiscretionaryAccessControls needsofcommercialandciviliangovernmentorganizations.itisapparentthatsignicant Recently,considerableattentionhasbeenpaidtoresearchingandaddressingthesecurity industryandciviliangovernmentthanthatofdac,althoughtheneedfordacwillcontinue andbroadsweepingsecurityrequirementsexistoutsidethedepartmentofdefense.[2], toexist. 2AspectsofSecurityPolicies impact.likedodagencies,civiliangovernmentandcommercialrmsareverymuchconcernedwithprotectingthecondentialityofinformation.thisincludestheprotectionoclosure,ortheftofcorporateresourcescoulddisruptanorganization'soperationsandhave immediate,seriousnancial,legal,humansafety,personalprivacyandpubliccondence datanetworksaremajorconcernsthroughoutallsectors.thecorruption,unauthorizeddis- [5],[6]Civiliangovernmentandcorporationsalsorelyheavilyoninformationprocessing ments.theintegrity,availability,andcondentialityofkeysoftwaresystems,databases,and systemstomeettheirindividualoperational,nancial,andinformationtechnologyrequirevelopmenttechniques.butmanyoftheseorganizationshaveevengreaterconcernforintegrity.[1curitythancondentiality.integrityisparticularlyrelevanttosuchapplicationsasfunds transfer,clinicalmedicine,environmentalresearch,airtraccontrol,andavionics.theimportanceofintegrityconcernsindefensesystemshasalsobeenstudiedinrecentyears.[7], privateorganizations.anorganizationalmeaningofsecuritycannotbepresupposed.each Withinindustryandciviliangovernment,integritydealswithbroaderissuesofse- personneldata,marketingplans,productannouncements,formulas,manufacturingandde- [8]Awidegamutofsecuritypoliciesandneedsexistwithinciviliangovernmentand traditionalmacanddaccontrols. organizationhasuniquesecurityrequirements,manyofwhicharediculttomeetusing mechanismthatpermitssystemuserstoallowordisallowotherusersaccesstoobjects undertheircontrol: groupstowhichtheybelong.thecontrolsarediscretionaryinthesensethat Ameansofrestrictingaccesstoobjectsbasedontheidentityofsubjectsand/or AsdenedintheTCSECandcommonlyimplemented,DACisanaccesscontrol 2
3 revokeaccesstoanyoftheobjectsundertheircontrolwithouttheintercessionofasystem asubjectwithacertainaccesspermissioniscapableofpassingthatpermission administrator. belefttothediscretionoftheindividualusers.adacmechanismallowsuserstograntor (perhapsindirectly)ontoanyothersubject(unlessrestrainedbymandatory accesscontrol).[4] areallowedaccess.fortheseorganizations,thecorporationoragencyistheactual\owner" ofsystemobjectsaswellastheprogramsthatprocessit.controlisoftenbasedonemployee Inmanyorganizations,theendusersdonot\own"theinformationforwhichthey DAC,asthenameimplies,permitsthegrantingandrevokingofaccessprivilegesto includedoctor,nurse,clinician,andpharmacist.rolesinabankincludeteller,loanocer, aspartofanorganization.thisincludesthespecicationofduties,responsibilities,and qualications.forexample,therolesanindividualassociatedwithahospitalcanassume functionsratherthandataownership. andaccountant.rolescanalsoapplytomilitarysystems;forexample,targetanalyst, situationanalyst,andtracanalystarecommonrolesintacticalsystems.arolebased accesscontrol(rbac)policybasesaccesscontroldecisionsonthefunctionsauserisallowed Accesscontroldecisionsareoftendeterminedbytherolesindividualuserstakeon toperformwithinanorganization.theuserscannotpassaccesspermissionsontoother forprivacyassociatedwiththediagnosisofailments,treatmentofdisease,andtheadministeringofmedicinewithahospital.tosupportsuchpolicies,acapabilitytocentrallycontrol andmaintainaccessrightsisrequired.thesecurityadministratorisresponsibleforenforcing policyandrepresentstheorganization. Securityobjectivesoftensupportahigherlevelorganizationalpolicy,suchasmain- usersattheirdiscretion.thisisafundamentaldierencebetweenrbacanddac. tainingandenforcingtheethicsassociatedwithajudge'schambers,orthelawsandrespect notpossesstheauthoritytopassthattransactionontoanurse. Forexample,adoctorcanbeprovidedwiththetransactiontoprescribemedicine,butdoes policiesarenon-discretionaryinthesensethattheyareunavoidablyimposedonallusers. arederivedfromexistinglaws,ethics,regulations,orgenerallyacceptedpractices.these somuchinaccordancewithdiscretionarydecisionsonthepartofasystemadministrator, butratherincompliancewithorganization-specicprotectionguidelines.thesepolicies Thedeterminationofmembershipandtheallocationoftransactionstoaroleisnot securityrequirements.asdenedinthetcsec,macis Ameansofrestrictingaccesstoobjectsbasedonthesensitivity(asrepresentedby (i.e.clearance)ofsubjectstoaccessinformationofsuchsensitivity.[4] alabel)oftheinformationcontainedintheobjectsandtheformalauthorization RBACisinfactaformofmandatoryaccesscontrol,butitisnotbasedonmultilevel withaccesstofunctionsandinformationthanstrictlywithaccesstoinformation. Rolebasedaccesscontrol,inmanyapplications(e.g.[9],[10],[11]isconcernedmore 3
4 principalconcernisprotectingtheintegrityofinformation:\whocanperformwhatactson onbothreadsandwritesareinsupportofthatrule.withinarole-basedsystem,the ofinformationfromahighleveltoalowlevelistheprincipalconcern.assuch,constraints operationalsensitivities)ofobjectswithinthedod.themilitarypolicyiswithrespecttoone typeofcapability:whocanreadwhatinformation.forthesesystemstheunauthorizedow analogoustotheprocessofclearingusers(grantingmembership)andthelabeling(associate Theactofgrantingmembershipandspecifyingtransactionsforaroleisloosely whatinformation." administrator.suchtransactionsincludetheabilityforadoctortoenteradiagnosis,prescribemedication,andaddaentryto(notsimplymodify)arecordoftreatmentsperformed onapatient.theroleofapharmacistincludesthetransactionstodispensebutnotprescribeprescriptiondrugs.membershipinaroleisalsograntedandrevokedbyasystem Arolecanbethoughtofasasetoftransactionsthatauserorsetofuserscanperformwithinthecontextofanorganization.Transactionsareallocatedtorolesbyasystem maintained.atransactioncanbethoughtofasatransformationprocedure[1](aprogram associatedsetofindividualmembers.asaresult,rbacsprovideameansofnamingand orportionofaprogram)plusasetofassociateddataitems.inaddition,eachrolehasan describingmany-to-manyrelationshipsbetweenindividualsandrights.figure1depictsthe relationshipsbetweenindividualusers,roles/groups,transformationprocedures,andsystem objectsṫhetermtransactionisusedinthispaperasaconveniencetorefertoabindingof Rolesaregrouporiented.Foreachrole,asetoftransactionsallocatedtheroleis transformationprocedureanddatastorageaccess.thisisnotunlikeconventionalusageof thetermincommercialsystems.forexample,asavingsdeposittransactionisaprocedure thatupdatesasavingsdatabaseandtransactionle.atransactionmayalsobequitegeneral, transactions,requiringexactlythesamereadandwriteaccesstothesamelesastheteller. here,becausethereadisnotboundtoaparticulardataitem,as\readsavingsle"is. e.g.\readsavingsle".notehowever,that\read"isnotatransactioninthesenseused Thedierenceistheprocessexecutedandthevalueswrittentothetransactionlogle. leandatransactionlogle.anaccountingsupervisormaybeabletoexecutecorrection access,canbeseenbyconsideringtypicalbankingtransactions.tellersmayexecutea savingsdeposittransaction,requiringreadandwriteaccesstospeciceldswithinasavings TheapplicabilityofRBACtocommercialsystemsisapparentfromitswidespread Theimportanceofcontrolovertransactions,asopposedtosimplereadandwrite use.baldwin[9]describesadatabasesystemusingrolestocontrolaccess.nashandpoland theserolebasedsystemshavebeendevelopedbyavarietyoforganizations,withnocom- [10]discusstheapplicationofrolebasedaccesscontroltocryptographicauthenticationdevicescommonlyusedinthebankingindustry.Workingwithindustrygroups,theNationaquirementsforCryptographicModules,"(FederalInformationProcessingStandard140-1) InstituteofStandardsandTechnologyhasdevelopedaproposedstandard,\SecurityRe- [11]thatwillrequiresupportforaccesscontrolandadministrationthroughroles.Todate, 4
5 User 4 Object 1 trans_a describedinthispaperaddresssecurityprimarilyforapplication-levelsystems,asopposed Figure1:RoleRelationships 1 User 5 3FormalDescriptionofRBAC togeneralpurposeoperatingsystems. monlyagreedupondenitionorrecognitioninformalstandards.rolebasedaccesscontrols trans_b Toclarifythenotionspresentedintheprevioussection,wegiveasimpleformaldescription, intermsofsetsandrelations,ofrolebasedaccesscontrol.noparticularimplementation Object 2 User 6 Eachsubjectmaybeauthorizedtoperformoneormoreroles: mechanismisimplied. Foreachsubject,theactiveroleistheonethatthesubjectiscurrentlyusing: Eachrolemaybeauthorizedtoperformoneormoretransactions: Subjectsmayexecutetransactions.Thepredicateexec(s,t)istrueifsubjectscanexecute transactiontatthecurrenttime,otherwiseitisfalse: AR(s:subject)=ftheactiveroleforsubjectsg RA(s:subject)=fauthorizedfoelsforsubjectsg Threebasicrulesarerequired: 1.Roleassignment:Asubjectcanexecuteatransactiononlyifthesubjecthasselectedor TA(fr:roleg)=ftransactionsauthorizedforrolerg beenassignedarole: exec(s:subject;t:tran)=trueisubjectscanexecutetransactiont. 5 8s:subject;t:tran(exec(s;t))AR(s)6=;) (1)
6 Theidenticationandauthenticationprocess(e.g.login)isnotconsideredatransaction. 2.Roleauthorization:Asubject'sactiverolemustbeauthorizedforthesubject: Allotheruseractivitiesonthesystemareconductedthroughtransactions.Thusallactive usersarerequiredtohavesomeactiverole. With(1)above,thisruleensuresthatuserscantakeononlyrolesforwhichtheyare authorizedforthesubject'sactiverole: authorized. 3.Transactionauthorization:Asubjectcanexecuteatransactiononlyifthetransactionis 8s:subject(AR(s)RA(s)) (2) With(1)and(2),thisruleensuresthatuserscanexecuteonlytransactionsforwhichthey notguaranteeatransactiontobeexecutablejustbecauseitisinta(ar(s)),thesetof thatadditionalrestrictionsmaybeplacedontransactionexecution.thatis,theruledoes transactionspotentiallyexecutablebythesubject'sactiverole.forexample,atraineefora areauthorized.notethat,becausetheconditionalis\onlyif",thisruleallowsthepossibility 8s:subject;t:tran(exec(s;t))t2TA(RA(s))) (3) supervisoryrolemaybeassignedtheroleof\supervisor",buthaverestrictionsappliedto forthesupervisorrole. hisorheruserrolethatlimitaccessibletransactionstoasubsetofthosenormallyallowed transaction. intothetransaction.securityissuesareaddressedbybindingoperationsanddataintoa transactionatdesigntime,suchaswhenprivacyissuesareaddressedinaninsurancequery cedure,plusasetofdataitemsaccessedbythetransformationprocedure.accesscontrolin therulesabovedoesnotrequireanychecksontheuser'srighttoaccessadataobject,oron thetransformationprocedure'srighttoaccessadataitem,sincethedataaccessesarebuilt Intheprecedingdiscussion,atransactionhasbeendenedasatransformationpro- onlytothetransformationprocedure,withoutincludingabindingtoobjects.thiswould requireafourthruletoenforcecontroloverthemodesinwhichuserscanaccessobjects throughtransactionprograms.forexample,afourthrulesuchas Itisalsopossibletoredenethemeaningof\transaction"intheaboverulestorefer couldbedenedusingatransaction(redenedtotransformationprocedure)toobjectaccess functionaccess(r;i;o;x)whichindicatesifitispermissibleforasubjectinrolertoaccess objectoinmodexusingtransactiont,wherexistakenfromsomesetofmodessuchasread, write,append.notethattheclark-wilsonaccesscontroltriplecouldbeimplementedby lettingthemodesxbetheaccessmodesrequiredbytransactiont,andhavingaone-to-one 8s:subject;t:tran;o:object(exec(s;t))access(AR(s);t;o;x)) (4) 6
7 ClarkandWilsonaccesscontrolasaspecialcase. relationshipbetweensubjectsandroles.rbac,aspresentedinthispaper,thusincludes requiresbindingthetransactionprogramtanddataobjectsthattcanaccess,andonly doctorcouldbeprovidedwithread/writeaccesstoaprescriptionle,whilethehospital pharmacistmighthaveonlyreadaccess.(recallthatuseoftherstthreerulesalone controlsaccesstothetransactions.)thisalternativeapproachusingthefourthrulemight behelpfulinenforcingcondentialityrequirements. Useofthisfourthrulemightbeappropriate,forexample,inahospitalsetting.A formanyrealsystems,andrbacshouldbeapplicabletosuchsystems. onlyinauthorizedwaysbyauthorizedusers.thisseemstobeareasonablesecurityobjective authorizedwayscanbeascomplexasthetransactionthatdidthemodication.forthis reason,thepracticalapproachisfortransactionstobecertiedandtrusted.iftransactions ofways,butoneaspect[8]ofintegrityisarequirementthatdataandprocessesbemodied Ingeneral,theproblemofdeterminingwhetherdatahavebeenmodiedonlyin AnotheruseofRBACistosupportintegrity.Integrityhasbeendenedinavariety mustbetrustedthenaccesscontrolcanbeincorporateddirectlyintoeachtransaction. inclusionofatransactiontoobjectaccesscontrolfunctioninrbacwouldbeusefulin signicantoverheadforalimitedbenetinenforcingintegrityrequirements.therefore, Requiringthesystemtocontrolaccessoftransactionprogramstoobjectsthroughtheaccess 4CentrallyAdministeringSecurityUsingRBAC some,butnotallapplications. functionusedinrule(4)mightthenbeausefulformofredundancy,butitcouldinvolve RBACisexibleinthatitcantakeonorganizationalcharacteristicsintermsofpolicyand structure.oneofrbac'sgreatestvirtuesistheadministrativecapabilitiesitsupports. tendtoremainrelativelyconstantorchangeslowlyovertime.theadministrativetask consistsofgrantingandrevokingmembershiptothesetofspeciednamedroleswithin membershiptoanexistingrole.whenaperson'sfunctionchangeswithintheorganization, theusermembershiptohisexistingrolescanbeeasilydeletedandnewonesgranted.finally, thesystem.whenanewpersonenterstheorganization,theadministratorsimplygrants whenapersonleavestheorganization,allmembershipstoallrolesaredeleted.foran OncethetransactionsofaRoleareestablishedwithinasystem,thesetransactions organizationthatexperiencesalargeturnoverofpersonnel,arole-basedsecuritypolicyis theonlylogicalchoice. canbecomposedoftheroleshealer,intern,anddoctor.figure2depictsanexampleof membershiptotheinternrole,thisimpliestransactionsoftheinternandhealernotthe sucharelationship. denedbyinternandhealer,aswellasthoseofadoctor.ontheotherhand,bygranting Inaddition,rolescanbecomposedofroles.Forexample,aHealerwithinahospital BygrantingmembershiptotheRoleDoctor,itimpliesaccesstoalltransactions 7
8 Object 1 trans_a User 1 Healer User 2 Object 2 trnas_b User 3 Object 3 trans_c User 4 Intern User 5 Object 4 Figure2:Mult-RoleRelationships trans_d Object 5 trans_e Doctor 8 Object 6 trans_f User 6 User 7 User 8 User 9
9 Doctor.However,bygrantingmembershiptotheHealerrole,thisonlyallowsaccesstothose jectives.[8]theprincipleofleastprivilegerequiresthatauserbegivennomoreprivilege Theprincipleofleastprivilegehasbeendescribedasimportantformeetingintegrityob- resourcesallowedundertherolehealer. 5PrincipleofLeastPrivilege thannecessarytoperformajob.ensuringleastprivilegerequiresidentifyingwhattheuser's jobis,determiningtheminimumsetofprivilegesrequiredtoperformthatjob,andrestrictingtheusertoadomainwiththoseprivilegesandnothingmore.bydenyingtosubjects ofleastprivilegecurrentlyexistswithinthecontextofthetcsec,requirementsrestrict transactionsthatarenotnecessaryfortheperformanceoftheirduties,thosedeniedprivilegescannotbeusedtocircumventtheorganizationalsecuritypolicy.althoughtheconcept thoseprivilegesofthesystemadministrator.throughtheuseofrbac,enforcedminimum ofduties.separationofdutiesisconsideredvaluableindeterringfraudsincefraudcan 6SeparationofDuties RBACmechanismscanbeusedbyasystemadministratorinenforcingapolicyofseparation occurifanopportunityexistsforcollaborationbetweenvariousjobrelatedcapabilities. privilegesforgeneralsystemuserscanbeeasilyachieved. allowedtoexecutealltransactionswithintheset.themostcommonlyusedexamplesare Separationofdutyrequiresthatforparticularsetsoftransactions,nosingleindividualbe theseparatetransactionsneededtoinitiateapaymentandtoauthorizeapayment.no singleindividualshouldbecapableofexecutingbothtransactions.separationofdutyis animportantconsiderationinrealsystems.[1],[12],[13],[14]thesetsinquestion willvarydependingontheapplication.inrealsituations,onlycertaintransactionsneed toberestrictedunderseparationofdutyrequirements.forexample,wewouldexpecta toadministrator"wouldnotbe. transactionfor\authorizepayment"toberestricted,butatransaction\submitsuggestion individualwhocanserveaspaymentinitiatorcouldalsoserveaspaymentauthorizer.this siderthecaseofinitiatingandauthorizingpayments.astaticpolicycouldrequirethatno wherecompliancewithrequirementscanonlybedeterminedduringsystemoperation.the objectivebehinddynamicseparationofdutyistoallowmoreexibilityinoperations.con- allocationoftransactionstoroles.themoredicultcaseisdynamicseparationofduty tionrequirementscanbedeterminedsimplybytheassignmentofindividualstorolesand Separationofdutycanbeeitherstaticordynamic.Compliancewithstaticsepara- couldbeimplementedbyensuringthatnoonewhocanperformtheinitiatorrolecouldalso performtheauthorizerrole.suchapolicymaybetoorigidforcommercialuse,makingthe exibilitycouldbeallowedbyadynamicpolicythatallowsthesameindividualtotakeon costofsecuritygreaterthanthelossthatmightbeexpectedwithoutthesecurity.more 9
10 thatheorshehadinitiated.thestaticpolicycouldbeimplementedbycheckingonlyroles bothinitiatorandauthorizerroles,withtheexceptionthatnoonecouldauthorizepayments ofusers;forthedynamiccase,thesystemmustusebothroleanduseridincheckingaccess totransactions. system.theclark-wilson[1]schemeincludestherequirementthatthesystemmaintainthe aper-userbasis,usingtheuseridfromtheaccesscontroltriple.asdiscussedabove,user separationofdutyrequirementexpressedintheaccesscontroltriples.enforcementison functionscanbeconvenientlyseparatedbyrole,sincemanyusersinanorganizationtypically performthesamefunctionandhavethesameaccessrightsontpsanddata.allocating accessrightsaccordingtoroleisalsohelpfulindeningseparationofdutyinawaythatcan Separationofdutyisnecessarilydeterminedbyconditionsexternaltothecomputer oragencyistheactual\owner"ofsystemobjects,anddiscretionaryaccesscontrolmay 7SummaryandConclusions beenforcedbythesystem. Inmanyorganizationsinindustryandciviliangovernment,theendusersdonot\own" theinformationforwhichtheyareallowedaccess.fortheseorganizations,thecorporation notbeappropriate.role-basedaccesscontrol(rbac)isanondiscretionaryaccesscontrol mechanismwhichallowsandpromotesthecentraladministrationofanorganizationalspecic ofanorganization.arolespeciesasetoftransactionsthatauserorsetofuserscan securitypolicy. performwithinthecontextofanorganization.rbacprovideameansofnamingand describingrelationshipsbetweenindividualsandrights,providingamethodofmeetingthe secureprocessingneedsofmanycommercialandciviliangovernmentorganizations. Accesscontroldecisionsareoftenbasedontherolesindividualuserstakeonaspart ofaccesscontrolsbasedonuserroles. encompassingrbac.assuch,evaluationandtestingprogramsforthesesystemshavenot beenestablishedastheyhaveforsystemsconformingtothetrustedcomputersecurity commercialsystemstoday,butthereisnocommonlyaccepteddenitionorformalstandards EvaluationCriteria.ThispaperproposedadenitionofTherequirementsandaccesscontrol rulesforrbacproposedinthispapercouldbeusedasthebasisforacommondenition Variousformsofrolebasedaccesscontrolhavebeendescribedandsomeareusedin 8References 1D.D.ClarkandD.R.Wilson.AComparisonofCommercialandMilitaryComputer SecurityPolicies.InIEEESymposiumonComputerSecurityandPrivacy,April1987. (draft).computersystemslaboratory,nist,january ComputersatRisk.NationalResearchCouncil,NationalAcademyPress, MinimumSecurityFunctionalityRequirementsforMulti-UserOperatingSystems 10
11 ofdefense,1985. Technology,1987. DataIntegrity.SP Natl.Inst.ofStds.andTechnology,1989. IntegrityPolicyinComputerInformationSystems.SP Natl.Inst.ofStds.and 4TrustedComputerSecurityEvaluationCriteria,DOD STD.Department 5Z.G.RuthbergandW.T.Polk,Editors.ReportoftheInvitationalWorkshopon 6S.W.KatzkeandZ.G.Ruthberg,Editors.ReportoftheInvitationalWorkshopon inlargedatabases.inieeesymposiumoncomputersecurityandprivacy,1990. September1991. EmbeddedSystems.InstituteforDefenseAnalyses,HQ /1,October K.R.PolandM.J.Nash.SomeConundrumsConcerningSeparationofDuty.In 8IntegrityinAutomatedInformationSystems.NationalComputerSecurity,Center, 9R.W.Baldwin.NamingandGroupingPrivilegestoSimplifySecurityManagement 7J.E.Roskos,S.R.Welke,J.M.Boone,andT.Mayeld.IntegrityinTacticaland Standard140-1,NationalInstituteofStandardsandTechnology,1992. Technology.InProceedingsof11thNationalComputerSecurityConference,October1988. IEEESymposiumonComputerSecurityandPrivacy,1990. AerospaceComputerSecurityApplicationsConference,December W.R.Shockley.ImplementingtheClark/WilsonIntegrityPolicyUsingCurrent 11SecurityRequirementsforCryptographicModules.FederalInformationProcessing ComputerSecurityandPrivacy,May R.Sandhu.TransactionControlExpressionsforSeparationofDuties.InFourth 14S.WisemanP.Terry.A'New'SecurityPolicyModel.InIEEESymposiumon 11
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
! PRIVATE!PAGES! DRUPAL!7!WEB!CONTENT!MANAGEMENT!
UNIVERSITY*OF*CALGARY InformationTechnologies PRIVATEPAGES DRUPAL7WEBCONTENTMANAGEMENT September2015 TableofContents FirstSteps...1 AddingaPrivatePage...2 AccessControl...4 PrivatePages Drupal7WebContentManagement
Tetrahedron 68 (2012) 6018e6031. Contents lists available at SciVerse ScienceDirect. Tetrahedron. journal homepage: www.elsevier.
Tetrahedron 68 (2012) 6018e6031 Contents lists available at SciVerse ScienceDirect Tetrahedron journal homepage: www.elsevier.com/locate/tet An isomerizationd1,3-dipolar cycloaddition tandem reaction towards
TRANSERV GLOBAL SERVICE & SUPPORT MAINTENANCE CONTRACTS
TRANSERV GLOBAL SERVICE & SUPPORT MAINTENANCE CONTRACTS TRANSAS SERVICE DEPARTMENT Worldwide Service The Transas Worldwide Service Network guarantees a rapid response to service enquiries 24 hours a day,
BLENDER INTRO BLENDER TIPS
AIG-3D.ps Page 1 AIG-3D.ps Page 2 AIG-3D.ps Page 3 AIG-3D.ps Page 4 AIG-3D.ps Page 5 AIG-3D.ps Page 6 AIG-3D.ps Page 7 AIG-3D.ps Page 8
Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012
Homework Assignment #3 Due 11/20 at 5:00pm EE122 Fall 2012 Please submit your solutions using BSpace (https://bspace.berkeley.edu/). Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa12 tab,
NDMS Risk Compliance Program
FRAUD THRESHOLDS (At Outlet ) NDMS Risk Compliance Program Fraud Compliance Program Fraud Performance (MFP) Program Global Audit Program (GMAP) US $5,000 of reported cross-border fraud 5 cross-border fraud
A Semantic Web Knowledge Base System that Supports Large Scale Data Integration
A Semantic Web Knowledge Base System that Supports Large Scale Data Integration Zhengxiang Pan, Yingjie Li and Jeff Heflin Department of Computer Science and Engineering, Lehigh University 19 Memorial
Assessing the Quality of Doctoral Programs in Criminology in the United States*
Assessing the Quality of Doctoral Programs in Criminology in the United States* Benjamin Steiner; John Schwartz Journal of Criminal Justice Education; Mar 2007; 18, 1; Research Library pg. 53 Reproduced
ENERGY: MODULAR POWER SYSTEM SIMULATOR. BASIC MODULE
issue:01/11 ENERGY: MODULAR POWER SYSTEM SIMULATOR. BASIC MODULE Ref: 0510 1 / 2 ITEM REFERENCE DESCRIPTION QTY. 1 MPSSC MODULAR POWER SYSTEM SIMULATOR WITH SCADA 1 CONTROL SYSTEM, FORMED BY: SCADA SCADA
MAINE STATE LIBRARY. Published by MAINE LEAGUE FOR NURSING COMMITTEE OF CAREERS. In cooperation with BLUE CROSS-BLUE SHIELD
MAINE STATE LIBRARY Published by MAINE LEAGUE FOR NURSING COMMITTEE OF CAREERS In cooperation with BLUE CROSS-BLUE SHIELD Associated Hospital Service of Main e 509 Forest Ave. Portland, Me. ' For Further
IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide
IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide Version 2.3.0 Copyright 2015 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change
PERSONAL ACCOUNT OPENING FORM - JOINT APPLICANT
PERSONAL ACCOUNT OPENING FORM - JOINT APPLICANT A. PERSONAL DETAILS Title: Mr Mrs Miss Minor Family name First name(s) Maiden/ Former name. Marital status Single Married Others If married, spouse full
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Model-Based Design Environment for Clinical Information Systems
Model-Based Design Environment for Clinical Information Systems Janos Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits Vanderbilt University TRUST Review, October 11,
Graduate School of Informatics
Graduate School of Informatics Admissions Policy '( ) ' ' - Master's Degree Program Major Enrollment Capacity 40 40 Doctor's Degree Program Major Enrollment Capacity 8 1 M. Entrance examination for international
HIV& AIDS BASIC FACTS. HIV & Drug Use. You are better off knowing if you have HIV. HIV & Sex. What are HIV & AIDS? HIV & Blood Products
What are HIV &? serious stage of HIV infection, called. stands for Acquired getting and can stay healthy for a long time. your age your sex your race or ethnic origin who you have sex with to a fetus or
Standard #4. a. Program Outcomes for the Human Resources Program. Students will be able to
Standard #4 a. Program Outcomes for the Human Resources Program Students will be able to Learning Outcome #1 synthesize the role of human resources management as it supports the success of the organization
Customizing the Security Architecture
Chapter7.fm Page 113 Wednesday, April 30, 2003 4:29 PM CHAPTER7 Customizing the Security Architecture The office of government is not to confer happiness, but to give men opportunity to work out happiness
CryptographicallyEnforced
Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol) Overview Cryptographically
TIBCO MFT Platform Server for IBM i User Guide. Software Release 7.1.0 April 2013
TIBCO MFT Platform Server for IBM i User Guide Software Release 7.1.0 April 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
FLEETVIEW ONLINE THE NEW AND IMPROVED FLEETVIEW ONLINE, NOW INCLUDING:
FLEETVIEW ONLINE THE NEW AND IMPROVED FLEETVIEW ONLINE, NOW INCLUDING: CHART AND DATA MANAGEMENT FUEL EFFICIENCY MONITORING PIRACY INFORMATION SHIP SECURITY FLEET TRACKING FLEETVIEW ONLINE FleetView Online
Health & Government Module 5 i2p Expedition India
Health & Government Module 5 i2p Expedition India National Emblem of India : Emblem i2p Expedition India India 2011 1 Take Home Points The United Nations has declared access to basic health care a human
VALUE ADDED SERVICES ON NAYATEL PHONE LINES Version 1.0
A Micronet Broad band Company VALUE ADDED SERVICES ON NAYATEL PHONE LINES Version 1.0 Code Barring Call Waiting Call Forwarding Wake up Call Don t Disturb Service Speed Dial 1 Call Transfer Three Way Conference
TRANSFER GUIDELINES TRANSFER GUIDELINES FOR MINISTRY OF HEALTH
TRANSFER GUIDELINES June 2012 TRANSFER GUIDELINES FOR MINISTRY OF HEALTH 2012 1 Contents FOREWORD 4 Interpretations 5 1.0 Background 6 2.0 Objectives 6 2.1 Definition of transfer 6 3.0 Conditions of transfer
Medical Professionalism in Lebanon: Challenges and Aspirations. Kamal F Badr, MD Associate Dean for Medical Education American University of Beirut
Medical Professionalism in Lebanon: Challenges and Aspirations Kamal F Badr, MD Associate Dean for Medical Education American University of Beirut Medical Professionalism in Lebanon: Challenges and Aspirations
LUCA GAMMAITONI NiPS Laboratory Università di Perugia, Italy. www.nipslab.org
LUCA GAMMAITONI NiPS Laboratory Università di Perugia, Italy www.nipslab.org Why are we spending time with the subject of Energy Harvesting? Why is Energy Harvesting so difficult? What are fluctuations
Annual Information Returns Dos and Don ts
1. Preparation of Annual Information Return (Original AIR) (a) Prepare the return as per the file format notified by ITD. It can be prepared using any in-house/third-party software. You can also use the
Question 1 Question 2. Question 3 How many online classes have you taken here at The University of West Florida? answered question skipped question
Please see the data below for discussion related to student perception of online and traditional classes offered at UWF. Although this is a small percentage of UWF students, I think the contrasts between
Financial Advisory Services & Training Financial Services Department www.finance.utoronto.ca/fast
Work Instruction Budget Movement Report For Fund Centers ZFTR055 When to Use This report is used to view the budget activity and totals for Funds Centers. Report Functionality Report can be run for individual
Security Management System Wiring Diagram Portfolio
Security Management System Wiring Diagram Portfolio SMS Wiring Portfolio Schlage Management System Table of Contents Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 SMS Reader Controller Configurations
Displaying an innovative approach towards port management
Displaying an innovative approach towards port management Port Management Information Systems As part of the world trade system, ports are complex entities.they need the full range of solutions to provide
The Statement of Fitness for Work from sick note to fit note
The Statement of Fitness for Work from sick note to fit note Background Information From 6 April 2010 the sick note is changing to become a fit note. Sick notes (or Medical Statements) are the forms issued
Content&Security RECOMMENDED(BEST(PRACTICES
Content&Security RECOMMENDED(BEST(PRACTICES for(production(&(post(production(/(editorial( Version(16.2 MANAGEMENT(CONTROLS PERSONNEL(AND(RESOURCES(/(PRODUCTION(OFFICE ASSET(MANAGEMENT(/(CAMERA(MEDIA PHYSICAL(SECURITY
Kāhuna Lapaÿau Healers & Food Science
Kāhuna Lapaÿau Healers & Food Science The field of medicine was one of the greatest strengths of our kūpuna, not only the diagnoses but also the treatments were very skilled procedures. They understood
BEING MOBILE WITH WINDOWS 8.1
www.realdolmen.com BEING MOBILE WITH WINDOWS 8.1 OCTOBER 28, 2014 SLIDE 1 SPEAKERS INTRO #Name: D Hoker Gino #Function: Technology Expert #Email: [email protected] #Twitter: @GinoDH #Blog: #Mobile:
CARING IN PLACE WEB USER GUIDE
CARING IN PLACE WEB USER GUIDE Instructions on how to use Caring in Place on the web The purpose of this document is to help you get started with Caring in Place on the web. Caring in Place is also available
Department of Defense
OFFICE OF THE INSPECTOR GENERAL REPORTING OF ACCOUNTS PAYABLE FOR THE NATIONAL GUARD AND RESERVE EQUIPMENT APPROPRIATION ON THE "OTHER DEFENSE ORGANIZATIONS" PORTION OF THE FY 1996 FINANCIAL STATE1\1ENTS
State of the EHR: The Vendor Perspective
State of the EHR: The Vendor Perspective AHIMA is the national association of health information management (HIM) professionals. AHIMA s 50,000 members are dedicated to the effective management of personal
What are research, evaluation and audit?
1 What are research, evaluation and audit? Barbara Sen, Maria J. Grant and Hannah Spring I don t do research. I don t have the time. I am too busy with the day to day running of the library. I do evaluations
INFORMATION ON DOCTORATE PROGRAMS
INFORMATION ON DOCTORATE PROGRAMS PH.D. IN CLINICAL-SURGICAL SCIENCES PH.D. IN ENVIRONMENTAL ANALYSIS AND MANAGEMENT PH.D. IN APPLIED ANTHROPOLOGY PH.D. IN BIOENGINEERING PH.D. IN MOLECULAR AND CELLULAR
Dawn Christie PSYCHIC RETREAT & SPA BALANCING SPIRIT, MIND & BODY
Dawn Christie PSYCHIC RETREAT & SPA BALANCING SPIRIT, MIND & BODY Dawn Christie Dawn Christie is an internationally acclaimed psychic, spiritual healer, consultant, teacher and lecturer. For over 25 years,
Department. CardholderGuide. Citi Commercial Cards Department of Defense
Department ofdefense TravelCard CardholderGuide Citi Commercial Cards Department of Defense Index Welcome... 1 Cardholders Benefit... 1 Lost Luggage Insurance... 2 Travel Accident Insurance... 2 Key Responsibilities...
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
How To Get Insurance In Finland
Insurance against an accident at work or occupational disease for employees coming to Finland Content: If you are coming to Finland from another EU member state 4 If you are coming to Finland from outside
Allied Health Professions
Allied Health Professions Presented By: Dorothy M. Hendrix Assistant Dean College of Science and Health Charles R. Drew University of Medicine and Science HEALTH CAREERS THE ALLIED HEALTH PROFESSIONS The
TRANSAS DP SIMULATOR
TRANSAS DP SIMULATOR A NAVI-TRAINER PROFESSIONAL MODULE The maritime industry faces a rapid increase in its need for certified Dynamic Positioning Operators (DPOs). This creates a demand for DPO training
Contents. Before you begin. How to work through this learner guide Assessment
Contents Contents Before you begin How to work through this learner guide Assessment Introduction: Assisting with claims management, rehabilitation and return-to-work programs v v vi 1 Chapter 1: Assisting
MODULE 1: Introduction
MODULE 1: Introduction Materials Flipchart, display material, pens Icebreaker Welcome everyone to the first session. Explain how long the training programme will run and how long each session will run
Allied Health Professions. PRESENTED BY: Harry E. Douglas, III, DPA Interim President Charles R. Drew University of Medicine and Science
Allied Health Professions PRESENTED BY: Harry E. Douglas, III, DPA Interim President Charles R. Drew University of Medicine and Science November 5, 2004 HEALTH CAREERS THE ALLIED HEALTH PROFESSIONS The
An Approach to Eliminate Semantic Heterogenity Using Ontologies in Enterprise Data Integeration
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3 rd, 2013 An Approach to Eliminate Semantic Heterogenity Using Ontologies in Enterprise Data Integeration Srinivasan Shanmugam and
7 Ways OpenStack Enables Automation & Agility for KVM Environments
7 Ways OpenStack Enables Automation & Agility for KVM Environments Table of Contents 1. Executive Summary 1 2. About Platform9 Managed OpenStack 2 3. 7 Benefits of Automating your KVM with OpenStack 1.
How LAPACK library enables Microsoft Visual Studio support with CMake and LAPACKE
How LAPACK library enables Microsoft Visual Studio support with CMake and LAPACKE Julie Langou 1, Bill Hoffman 2, Brad King 2 1. University of Tennessee Knoxville, USA 2. Kitware Inc., USA This article
