CSE543 - Introduction to Computer and Network Security. Module: Access Control
|
|
|
- Eleanor Preston
- 10 years ago
- Views:
Transcription
1 CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1
2 Policy A policy specifies the rules of security Some statement of secure procedure or configuration that parameterizes the operation of a system Example: Airport Policy Take off your shoes No bottles that could contain > 3 ozs Empty bottles are OK? You need to put your things through X-ray machine Laptops by themselves, coat off Go through the metal detector Goal: prevent on-airplane (metal) weapon, flammable liquid, dangerous objects (successful?) 2
3 Computer Security Policy Goals Secrecy Don t allow reading by unauthorized subjects Control where data can be written by authorized subjects Why is this important? Integrity Don t permit dependence on lower integrity data/code Why is this important? What is dependence? Availability The necessary function must run Doesn t this conflict with above? 3
4 when policy goes wrong Driving license test: take until you pass Mrs. Miriam Hargrave of Yorkshire, UK failed her driving test 39 times between 1962 and 1970!!!! she had 212 driving lessons. She finally got it on the 40th try. Some years later, she was quoted as saying, sometimes I still have trouble turning right A policy is a set of acceptable behaviors. - F. Schneider 4
5 Access Control/Authorization Access control/authorization determines what rights (operations) a particular subject has for a set of objects It answers the question E.g., do you have the right to read /etc/passwd Does Alice have the right to view the CSE website? Do students have the right to share project data? Does Dr. Jaeger have the right to change your grades? An Access Control Policy answers these questions 5
6 Simplified Access Control Subjects are the active entities that do things E.g., you, Alice, students, Prof. Jaeger Objects are passive things that things are done to E.g., /etc/passwd, CSE website, project data, grades Rights (operations) are actions that are taken E.g., read, view, share, change 6
7 Access Control Models What language should I use to express policy? Access Control Model Oodles of these Some specialize in secrecy Bell-LaPadula Some specialize in integrity Clark-Wilson Some focus on jobs RBAC Some specialize in least privilege SELinux Type Enforcement Q: Why are there so many different models? 7
8 Groups Groups are collections of identities who are assigned rights as a collective Important in that it allows permissions to be assigned in aggregates of users Users Group Alice Bob Ivan Trent This is really about membership Standard DAC Permissions are transient Permissions 8
9 Job Functions In an enterprise, we don t really do anything as ourselves, we do things as some job function E.g., student, professor, doctor One could manage this as groups, right? We are assigned to groups all the time, and given similar rights as them, i.e., mailing lists 9
10 Roles A role is a collection of privileges/permissions associated with some function or affiliation NIST studied the way permissions are assigned and used in the real world, and this is it Users Role Read Delete Write Modify Permissions Important: the permissions are static, the user-role membership is transient This is not standard DAC 10
11 RBAC Sessions During a session, a user assumes a subset available roles Known as activating a set of roles The user rights are the union of the rights of the activated roles Note: the session terminates at the user s discretion 11
12 Constraints You want to constrain evolution of protection states Constraints are explicit ways of doing just this Constraints available (in RBAC) role assumption perm-role assignment user-role assignment Examples in RBAC: Required inclusion: You must be acting as an employee of Pennsylvania State University to be a professor You must assume a (parent) role to assume another (child) role Mutual exclusion: can not be both CFO and auditor for the same company (unless you work for Enron) Cardinality constraint: only one (or n) of a particular role 12
13 Safety Problem For a protection system Prove that any future state will not result in the leakage of an access right to an unauthorized user Q: Why is this important? For most discretionary access control models, Safety is undecideable Means that we need another way to prove safety Restrict the model (be careful) Test incrementally (constraints) How do RBAC models address the safety problem? 13
14 Mandatory Access Control Recall protection state methods For MAC, only administrators can modify policy Enables validation of security Only (a few) root processes can load policy to LSM Thus, LSM is a MAC protection system Use MAC to confine network-facing daemons Run as root, but use MAC to limit permissions Protect kernel and processes that can modify kernel Some LSM modules also manage privilege escalation Control setuid (later...) 14
15 Mandatory Protection System Labeling State File: newfile File: acct Transition State secret secret unclassified trusted read read read write untrusted Protection State Process: newproc unclassified read read read write trusted write read write write Process: other untrusted read write read write read write 15
16 Mandatory Protection System Protection State Fixed set of labels for subjects and objects Fixed set of operations What happens when a new file is created? Labeling State Associates subjects and objects with labels All subjects and objects are labeled at all times What happens when you want to change permissions? Transition State Associate condition with label change 16
17 Secrecy Does the following protection state ensure the secrecy of J s private key in O1? O 1 O 2 O 3 J R RW RW S 2 - R RW S 3 - R RW 17
18 Integrity Does the following access matrix protect the integrity of J s public key file O2? O 1 O 2 O 3 J R RW RW S 2 - R RW S 3 - R RW 18
19 Trusted Processes Does it matter if we do not trust some of J s processes? O 1 O 2 O 3 J R RW RW Trojan Horse: Attacker controlled code run by J can violate secrecy Confused Deputy: Attacker may trick J to violate integrity S 2 - R RW S 3 - R RW 19
20 Protection vs Security Protection Security goals met under trusted processes Protects against an error by a non-malicious entity Security Security goals met under potentially malicious processes Protects against any malicious entity Hence, For J: Non-malicious process shouldn t leak the private key by writing it to O3 A potentially malicious process may contain a Trojan horse that can write the private key to O3 20
21 Multilevel Security A multi-level security system tags all object and subject with security tags classifying them in terms of sensitivity/access level. We formulate an access control policy based on these levels We can also add other dimensions, called categories which horizontally partition the rights space (in a way similar to that as was done by roles) security levels categories 21
22 US DoD Policy Used by the US military (and many others), uses MLS to define policy Levels: UNCLASSIFIED < CONFIDENTIAL < SECRET < TOP SECRET Categories (actually unbounded set) NUC(lear), INTEL(igence), CRYPTO(graphy) Note that these levels are used for physical documents in the governments as well. 22
23 Assigning Security Levels All subjects are assigned clearance levels and compartments Alice: (SECRET, {CRYTPO, NUC}) Bob: (CONFIDENTIAL, {INTEL}) Charlie: (TOP SECRET, {CRYPTO, NUC, INTEL}) All objects are assigned an access class DocA: (CONFIDENTIAL, {INTEL}) DocB: (SECRET, {CRYPTO}) DocC: (UNCLASSIFIED, {NUC}) 23
24 Evaluating Policy Access is allowed if subject clearance level >= object sensitivity level and subject categories object categories (read down) Bob: CONF., {INTEL}) Charlie: TS, {CRYPTO, NUC, INTEL}) Alice: (SEC., {CRYTPO, NUC}) DocB: (SECRET, {CRYPTO}) DocA: (CONFIDENTIAL, {INTEL}) DocC: (UNCLASSIFIED, {NUC}) Q: What would write-up be? 24
25 Bell-La Padula Model A Confidentiality MLS policy that enforces: Simple Security Policy: a subject at specific classification level cannot read data with a higher classification level. This is short hand for no read up. * (star) Property: also known as the confinement property, states that subject at a specific classification cannot write data to a lower classification level. This is shorthand for no write down. 25
26 How about integrity? MLS as presented before talks about who can read a document (confidentiality) Integrity considers who can write to a document Thus, who can affect the integrity (content) of a document Example: You may not care who can read DNS records, but you better care who writes to them! Biba defined a dual of secrecy for integrity Lattice policy with, no read down, no write up Users can only create content at or below their own integrity level (a monk may write a prayer book that can be read by commoners, but not one to be read by a high priest). Users can only view content at or above their own integrity level (a monk may read a book written by the high priest, but may not read a pamphlet written by a lowly commoner). 26
27 Biba (example) Which users can modify what documents? Remember no read down, no write up Bob: (CONF., {INTEL}) Charlie: (TS, {CRYPTO, NUC, INTEL}) Alice: (SEC., {CRYTPO, NUC})????? DocB: (SECRET, {CRYPTO}) DocA: (CONFIDENTIAL, {INTEL}) DocC: (UNCLASSIFIED, {NUC}) 27
28 Window Vista Integrity Integrity protection for writing Defines a series of protection level of increasing protection installer (highest) system high (admin) medium (user) low (Internet) untrusted (lowest) Semantics: If subject s (process s) integrity level dominates the object s integrity level, then the write is allowed 28
29 Vista Integrity S1(installer) O1(admin) S2(user) 02(untrusted) S3(untrusted) 03(user) 29
30 Vista Integrity S1(installer) O1(admin) S2(user) 02(untrusted) S3(untrusted) 03(user) 30
31 Integrity, Sewage, and Wine Mix a gallon of sewage and one drop of wine gives you? Mix a gallon of wine and one drop of sewage gives you? Integrity is really a contaminant problem: you want to make sure your data is not contaminated with data of lower integrity. 31
32 LOMAC Low-Water Mark integrity Change integrity level based on actual dependencies Subject is initially at the highest integrity But integrity level can change based on objects accessed Ultimately, subject has integrity of lowest object read 32
33 Clark-Wilson Integrity Map Integrity in Business (e.g., accounting) to Computing High Integrity Data (objects) Constrained Data Items (CDIs) High Integrity Processes (programs) Transformation Procedures (TPs) Check Integrity of Data Initially (verification) Integrity Verification Procedures (IVPs) Premise If the IVPs verify initial integrity and high integrity data is only modified by TPs Then, the integrity of computation is preserved 33
34 Clark-Wilson Permissions User User User User CDI CDI CDI CDI 34
35 CW Permissions (cont.) User User User User TP TP TP CDI CDI CDI CDI 35
36 CW Permissions (cont.) A user can access an CDI using TP iff 1. The user has been granted CDI access 2. The TP has been granted CDI access 3. The user has been granted access to the TP User User User User User User User User TP TP TP CDI CDI CDI CDI CDI CDI CDI CDI 36
37 Clark-Wilson Issues Assure Function Certify IVPs, TPs to be valid (i.e., correct) (C1,C2) Is there a general way of defining correctness? Handle Low Integrity Data A TP must upgrade or discard any UDI (low integrity data) it receives (C5) Reality: this is a nice model, but too heavyweight in general for most applications. CW-lite (Jaeger) is an alternative that is tractable to implement. 37
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
Information Security Information & Network Security Lecture 2
1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term 2 Security Policies 3 Introduction So you ve succeeded as SO in convincing people
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Part III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
CIS433/533 - Computer and Network Security Operating System Security
CIS433/533 - Computer and Network Security Operating System Security Professor Kevin Butler Winter 2010 Computer and Information Science OS Security An secure OS should provide (at least) the following
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
What is a secret? Ruth Nelson
What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions
SELinux Policy Management Framework for HIS
SELinux Policy Management Framework for HIS by Luis Franco Marin (05592763) BSc., MIT This thesis is presented in fulfilment of the requirements of the degree of Master of Information Technology (Research)
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module
CS 665: Computer System Security Designing Trusted Operating Systems Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Trusted? An operating system is
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg
Lecture 3 Access Control Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M. Introduction
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
Operating System Security
Operating System Security Synthesis Lectures on Information Security, Privacy and Trust Editor Ravi Sandhu, University of Texas, San Antonio Operating System Security Trent Jaeger 2008 Copyright 2008
Introduction to Computer Security
Introduction to Computer Security Access Control and Authorization Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access recapitulated 1. Identification Which object O requests
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema
CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor
CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
INFO/CS 330: Applied Database Systems
INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke [email protected] http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be
A Firewall Model of File System Security
Ph.D Dissertation Proposal A Firewall Model of File System Security By Lihui Hu Department Of Computer Science Michigan Technological University March 2010 Committee Members: Dr. Jean Mayo, Chair Dr. Steve
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
Advanced Systems Security: Retrofitting Commercial Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Bell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix
1 Security Policy A document that expresses clearly and concisely what the protection mechanisms are to achieve A statement of the security we expect the system to enforce Bell & LaPadula Model Formalization
Computer Security CS 426. CS426 Fall 2010/Lecture 40 1
Computer Security CS 426 Review for Final Exam CS426 Fall 2010/Lecture 40 1 Basic Concepts Confidentiality Integrity Availability Authenticity Integrity (in communications) Non-repudiation Privacy (general
Access Control Basics. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Basics Murat Kantarcioglu Access Control - basic concepts An access control system regulates the operations that can be executed
TRANSMAT Trusted Operations for Untrusted Database Applications
TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: [email protected] Abstract This paper presents a technique
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Domain 9 Security Architecture and Design
Domain 9 Security Architecture and Design Common Architecture Frameworks An architecture framework is a structure that can be used to develop a broad range of architectures, which typically provides a
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
2009-2010. SSL Firewalls
& 2009-2010 & ( ) SSL Firewalls :. :.. byte 0x01 : 1,. 1 , :,, : ( ) ). : : (Confidentiality) (Integrity) (Availability) :.,,. :. :...,,. :,,. 2 (Identification) (Authentication).,,, )... (Authorization)
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
Access Control. Dr George Danezis ([email protected])
Access Control Dr George Danezis ([email protected]) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional
Goal-Oriented Auditing and Logging
1. Introduction Goal-Oriented Auditing and Logging Matt Bishop Christopher Wee Jeremy Frank Department of Computer Science University of California at Davis Davis, CA 95616-8562 This paper presents a technique
Security Architecture and Design
IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield Domain Overview Identify key principles and concepts critical to securing the infrastructure
The Asbestos Operating System
p. 1/26 The Asbestos Operating System Petros Efstathopoulos, Maxwell Krohn, Steve VanDeBogart, Cliff Frey, Martijn Stevenson, Nickolai Zeldovich, David Ziegler, Eddie Kohler, David Mazières, Frans Kaashoek,
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,
Mandatory Access Control
Mandatory Access Control Håkan Lindqvist May 18, 2006 Master s Thesis in Computing Science, 20 credits Supervisor at CS-UmU: Jonny Pettersson Examiner: Per Lindström Umeå University Department of Computing
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
Access Control Lists in Linux & Windows
Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)
A Survey of Access Control Policies
A Survey of Access Control Policies Amanda Crowell University of Maryland [email protected] ABSTRACT Modern operating systems each have different implementations of access controls and use different
Session objectives. Access control. Subjects and objects. The request. Information Security
The session Session objectives Access Control Information Security Dr Hans Georg Schaathun Introduce fundamental terminology of access control Understand principles of privilege management and identity
A Simple Implementation and Performance Evaluation Extended-Role Based Access Control
A Simple Implementation and Performance Evaluation Extended-Role Based Access Control Wook Shin and Hong Kook Kim Dept. of Information and Communications, Gwangju Institute of Science and Technology, 1
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
? Resource. Outline. Access Control and Operating System Security. Access control. Access control matrix. Capabilities. Two implementation concepts
Access Control and Operating System Security John Mitchell Outline Access Control Matrix, ACL, Capabilities Multilevel security (MLS) OS Policies Multics Ring structure Unix File system, Setuid Windows
Securing Data in a RHEL SELinux Multi-Level Secure Environment
Securing Data in a RHEL SELinux Multi-Level Secure Environment 201504 MLS Overview Red Hat Enterprise Linux (RHEL) forms the foundation of the Multi-Level Security (MLS) system Security Enhanced Linux
University of Cambridge
University of Cambridge Computer Laboratory ESSAYS ABOUT COMPUTER SECURITY Prof. E. Stewart Lee Director Centre for Communications Systems Research Cambridge Cambridge, 1999 Preface The purpose of these
Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21
Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed
Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
CSE543 - Introduction to Computer and Network Security. Module: Operating System Security
CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to
VALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
Document Management System Security
Document Management System Security Jonas Birmé [email protected] January 24, 2005 20 credits Umeå University Department of Computing Science SE-901 87 UMEÅ SWEDEN Abstract A common demand today is that
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
NAVAL POSTGRADUATE SCHOOL DISSERTATION
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DISSERTATION AN APPLICATION OF ALLOY TO STATIC ANALYSIS FOR SECURE INFORMATION FLOW AND VERIFICATION OF SOFTWARE SYSTEMS by Alan B. Shaffer December 2008
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Secure to the Core: The Next Generation Secure Operating System from CyberGuard
Secure to the Core: The Next Generation Secure Operating System from CyberGuard Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP, CISM, CISA Senior Vice President CyberGuard Corp A CyberGuard Corporation
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
USER ACCESS CONTROL AND SECURITY MODEL
102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap ([email protected], [email protected], [email protected]) Faculty of Computer Science and nformation
