Risk-Aware Role-Based Access Control
|
|
|
- Wilfred Andrews
- 10 years ago
- Views:
Transcription
1 Risk-Aware Role-Based Access Control Liang Chen Jason Crampton Information Security Group, Royal Holloway, University of London 7th International Workshop on Security and Trust Management
2 Risk-Aware RBAC Introduction Introduction Risk-aware access control was proposed to enable the secure sharing of information within or across multiple organizations An access request is evaluated based on the estimate of the expected costs and benefits of allowing access Risk-aware access control is more permissive than traditional policy-based access control Role-based access control (RBAC) has become today s dominant access control paradigm ANSI RBAC standard released in 2004 Major IT vendors offer products that support RBAC How can we extend role-based access control to become risk-aware?
3 Risk-Aware RBAC Introduction Motivations Existing risk-aware RBAC models have limitations Existing models have a limited way of access the risk of allowing access requests (only in terms of users trustworthiness) Existing models only support the type of binary decisions, where the accesses with acceptable risk are allowed and denied otherwise No existing model considers the incorporation of risk mitigation strategies to support richer types of access control decisions
4 Risk-Aware RBAC Introduction Outline of talk Define new way of looking at RBAC96 authorization semantics Risk threshold and risk mitigation Risk-aware RBAC models and their ways of computing risk Conclusion and future work
5 Risk-Aware RBAC RBAC96 RBAC96 RBAC96 defines a number of basic components: users U, roles R, permissions P, a partially ordered set of roles RH R R, a user-role assignment relation UA U R, and a permission-role assignment relation PA P R A graph-based formalism of RBAC96 provides a simple way of evaluating access requests We represent an RBAC96 state as an acyclic directed graph G = (V,E), where V = U R P, and E = UA PA RH An authorization path (au-path) between v 1 and v n is a sequence of vertices v 1,...,v n such that (v i,v i+1 ) E, i = 1,...,n 1 A user u V is authorized for p V if and only if there exists an au-path u = v 1,...,v n = p
6 Risk-Aware RBAC Risk mitigation strategy Risk threshold and risk mitigation We assume the existence of a risk domain D = [0,1] We write [t,t ) to denote the risk interval {x D : t x < t } Given a request (u,p), we write risk(u,p) to denote the risk of allowing u to perform some permission p We associate each permission with a risk mitigation strategy [(0, ),(t 1,b 1 ),...,(t n 1,b n 1 ),(t n, )], where 0 < t 1 < < t n 1, b i B is some system obligation, and denotes null obligation The request (u,p) is permitted if risk(u,p) < t 1 The request (u,p) is permitted with the enforcement of b i if risk(u,p) [t i,t i+1 ) The request (u,p) is denied if risk(u,p) t n
7 Risk-Aware RBAC Risk representation Defining the risk of allowing access Generally, given a request (u,p), risk(u,p) can be determined by the cost and likelihood of p being misused Our approach to the definition of risk mitigation strategies on a per-permission basis suggests that we can ignore the cost of p s misuse when considering the risk of granting p There are at least three possible ways of qualifying the likelihood of p being misused The degree of trustworthiness of users who request to invoke p The degree of competence of a user-role assignment The degree of appropriateness of a permission-role assignment We develop three simple models for risk-aware RBAC which embody the three distinct ways of computing risk(u, p)
8 Risk-Aware RBAC RBAC T RBAC T RBAC T augments RBAC96 with risk mitigation strategies on permissions and a function α : U (0,1] which is used to specify users s trustworthiness Given a request (u,p), we write Π(u,p) to denote the set of au-paths between u and p We define a risk function risk T : U P [0,1], where 1 α(u) if Π(u,p) risk T (u,p) = 1 otherwise
9 Risk-Aware RBAC RBAC C RBAC C Unlike RBAC T, RBAC C defines a function β : U R (0,1] which specifies users s degree of competence to perform roles Informally, given a request (u,p), risk(u,p) is determined by finding a role r for which u is most competent and that lies on an au-path from u to p We define a risk function risk C : U P [0,1], where 1 if u p = risk C (u,p) = 1 max{β(u,r) : r u p} otherwise u is a set of roles for which u is explicitly assigned p is a set of entities that are authorized for p
10 Risk-Aware RBAC RBAC C A simple example u 1 = {r 1,r 2 } with β(u 1,r 1 ) = 1 2 and β(u 1,r 2 ) = 1 3 u 1 is able to perform p 1 through the role r 1 for which u 1 is most competent, and hence risk C (u 1,p 1 ) = 1 2 risk C (u 1,p 3 ) = 1 as there is no aupath from u 1 to p 3 r 1 u p 1 r2 p u 2 r3 p 3 1 2
11 Risk-Aware RBAC RBAC A RBAC A RBAC A introduces a function on permission-role assignments, γ : P R (0,1] which specifies the degree of appropriateness with which permissions are assigned to roles Given a request (u,p), risk(u,p) is determined by a role that u can activate and that is the most appropriate role to which p is assigned We define a risk function risk A : U P [0,1], where 1 if p u = risk A (u,p) = 1 max{γ(p,r) : r p u} otherwise p is a set of roles to which p is explicitly assigned u is a set of entities for which u is authorized
12 Risk-Aware RBAC A complete model A complete model for risk-aware RBAC We introduce a risk-aware RBAC model that combines the features of the RBAC T, RBAC C and RBAC A models Given a request (u,p), risk(u,p) can be computed by finding an au-path between u and p with a minimum risk, but how can we compute the risk associated with each au-path from u to p? There are at least two approaches to computing the risk associated with an au-path u,r,...,r,p based on α, β and γ 1 min{α(u),β(u,r),γ(r,p)} min{1,(1 α(u))+(1 β(u,r))+(1 γ(r,p))}
13 Risk-Aware RBAC A complete model Other stuff in the proceedings Examine the advantages of flat risk-aware RBAC Consider sessions in risk-aware RBAC
14 Risk-Aware RBAC Concluding remarks Contributions We examine three possible ways of defining risk in different components of RBAC96 We provide a sophisticated treatment of risk mitigation strategies at permission level We develop a family of risk-aware RBAC models which differ in the way of measuring and computing risk Unlike existing work, our models: have clear authorization semantics support richer types of access control decisions
15 Risk-Aware RBAC Concluding remarks Current and Future work Extend our risk-aware models to include user obligations, and use the idea of charging for risk to enforce those obligations Construct RBAC C and RBAC A states from a given RBAC96 state Investigate a way of defining β values on those user-role assignments which are not encoded in a given RBAC96 state Propose an approach to defining γ values on permission-role assignments based on a given RBAC96 state Develop a risk-aware auto-delegation mechanism for RBAC Develop an auto-delegation RBAC model using our risk-aware approach Examine a way of combining risk mitigation with auto-delegation RBAC policies
16 Risk-Aware RBAC Questions Questions?
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen and Jason Crampton Information Security Group and Department of Mathematics Royal Holloway, University of London {liang.chen.2005,jason.crampton}@rhul.ac.uk
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Policy Analysis for Administrative Role Based Access Control
Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
CryptographicallyEnforced
Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol) Overview Cryptographically
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
Lightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology
COS 597A: Principles of Database and Information Systems elational model elational model A formal (mathematical) model to represent objects (data/information), relationships between objects Constraints
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Section 13.5 Equations of Lines and Planes
Section 13.5 Equations of Lines and Planes Generalizing Linear Equations One of the main aspects of single variable calculus was approximating graphs of functions by lines - specifically, tangent lines.
Controlling Database Access by Providing Access Permissions on Database Objects
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1215 Controlling Database Access by Providing Access Permissions on Database Objects 1 Manushi Majumdar, 2 Anu
Expressing User Access Authorization Exceptions in Conventional Role-based Access Control
Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu 1,2, Natasha Alechina 1, and Brian Logan 1 1 School of Computer Science, University of Nottingham,
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Addressing threats to real-world identity management systems
Addressing threats to real-world identity management systems Wanpeng Li and Chris J Mitchell Information Security Group Royal Holloway, University of London Agenda Single sign-on and identity management
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University and MAHESH V. TRIPUNITARA Motorola Labs The administration of large role-based access control (RBAC) systems is a challenging
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University MAHESH V. TRIPUNITARA Motorola Labs The administration of large Role-Based Access Control (RBAC) systems is a challenging problem.
Estimating the Average Value of a Function
Estimating the Average Value of a Function Problem: Determine the average value of the function f(x) over the interval [a, b]. Strategy: Choose sample points a = x 0 < x 1 < x 2 < < x n 1 < x n = b and
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Parametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
Collaborative Software Design & Development. *Collaboration*
Collaborative Software Design & Development Lecture 5 Collaborative Software Design & Development *Collaboration* Dewayne E Perry ENS 623A Office Hours: T/Th 10:00-11:00 perry @ ece.utexas.edu www.ece.utexas.edu/~perry/education/382v-s08/
A COMBINED FINE-GRAINED AND ROLE-BASED ACCESS CONTROL MECHANISM HONGI CHANDRA TJAN. Bachelor of Science. Oklahoma State University
A COMBINED FINE-GRAINED AND ROLE-BASED ACCESS CONTROL MECHANISM By HONGI CHANDRA TJAN Bachelor of Science Oklahoma State University Stillwater, Oklahoma 200 Submitted to the faculty of the Graduate College
Business Process Management In An Application Development Environment
Business Process Management In An Application Development Environment Overview Today, many core business processes are embedded within applications, such that it s no longer possible to make changes to
Criticality of Schedule Constraints Classification and Identification Qui T. Nguyen 1 and David K. H. Chua 2
Criticality of Schedule Constraints Classification and Identification Qui T. Nguyen 1 and David K. H. Chua 2 Abstract In construction scheduling, constraints among activities are vital as they govern the
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
Delta Analysis of Role-Based Access Control Models
Delta Analysis of Role-Based Access Control Models Maria Leitner University of Vienna, Austria Faculty of Computer Science [email protected] Abstract. Role-based Access Control (RBAC) is de facto
BIG. Big Data Analysis John Domingue (STI International and The Open University) Big Data Public Private Forum
Big Data Analysis John Domingue (STI International and The Open University) Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No. 257943) 1 The Data landscape
Foundations Applications Technologies
Institute for Cyber Security ICS Research Projects Ravi Sandhu Institute for Cyber Security University of Te exas at San Antonio August 30, 2012 IIIT Delhi 1 ICS Philosophy Foundations Applications Technologies
II. BASICS OF PACKET FILTERING
Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer
INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE
INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE Luís Manuel Borges Gouveia Feliz Ribeiro Gouveia {lmbg, fribeiro}@ufp.pt Centro de Recursos Multimediáticos Universidade Fernando Pessoa Porto -
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
Report. Technical. Technologie-Zentrum Informatik. A Classification Framework Designed for Advanced Role-based Access Control Models and Mechanisms
Technologie-Zentrum Informatik Report Technical 51 A Classification Framework Designed for Advanced Role-based Access Control Models and Mechanisms Christopher Alm Michael Drouineaud Ute Faltin Karsten
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some
Section 3.1: First Derivative Test Definition. Let f be a function with domain D. 1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some open interval containing c. The number
Linear functions Increasing Linear Functions. Decreasing Linear Functions
3.5 Increasing, Decreasing, Max, and Min So far we have been describing graphs using quantitative information. That s just a fancy way to say that we ve been using numbers. Specifically, we have described
Secure Document Circulation Using Web Services Technologies
Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany [email protected]
KEYWORD SEARCH IN RELATIONAL DATABASES
KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Data Integration Alternatives Managing Value and Quality
Solutions for Customer Intelligence, Communications and Care. Data Integration Alternatives Managing Value and Quality Using a Governed Approach to Incorporating Data Quality Services Within the Data Integration
Representation of functions as power series
Representation of functions as power series Dr. Philippe B. Laval Kennesaw State University November 9, 008 Abstract This document is a summary of the theory and techniques used to represent functions
Slope and Rate of Change
Chapter 1 Slope and Rate of Change Chapter Summary and Goal This chapter will start with a discussion of slopes and the tangent line. This will rapidly lead to heuristic developments of limits and the
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
A Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK [email protected] Abstract. Contracts have proved a powerful concept
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving Alessandro Armando 1,2 and Silvio Ranise 2, 1 DIST, Università degli Studi di Genova, Italia 2 Security
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling Proceedings of the 8th International Conference on Parallel Problem Solving from Nature (PPSN VIII), LNCS 3242, pp 581-590,
Enforcing Security Policies. Rahul Gera
Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
CSI 333 Lecture 1 Number Systems
CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...
International Journal of Software Engineering and Knowledge Engineering c World Scientific Publishing Company
International Journal of Software Engineering and Knowledge Engineering c World Scientific Publishing Company Rapid Construction of Software Comprehension Tools WELF LÖWE Software Technology Group, MSI,
Introduction to Web Services
Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies
The Structure and Coding of Logical Link Control (LLC) Addresses: A Tutorial Guide
The Structure and Coding of Logical Link Control (LLC) Addresses: A Tutorial Guide Introduction The standards for local area networks (LANs) are generally comprised of the physical layer, the medium access
Arithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
White Paper: Security and Agility in the API Economy. Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7
White Paper: Security and Agility in the API Economy Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7 Security and Agility in the API Economy The API Economy is more than the
Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
Software Architecture
Cairo University Faculty of Computers and Information Computer Science Department Premasters Studies Software Architecture Report on Software Product Line Submitted to: Dr. Hany Ammar Submitted by: Hadeel
Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001
A comparison of the OpenGIS TM Abstract Specification with the CIDOC CRM 3.2 Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001 1 Introduction This Mapping has the purpose to identify, if the OpenGIS
