Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.
|
|
|
- Gary Evans
- 10 years ago
- Views:
Transcription
1 Implementation of Mandatory Access Control in Role-based Security System CSE367 Final Project Report Professor Steve Demurjian Fall 2001 Jin Ma Computer Science & Engineering The University of Connecticut Storrs, CT
2 Contents Abstract 1. Introduction 2. Access Control Models 2.1 Mandatory Access Control (MAC) 2.2 Role-based Access Control (RBAC) 2.3 Combination of MAC and RBAC 3. Framework of Existing Role-based Security System 3.1 Software Architecture 3.2 The Unified Security Resource (USR) 4. Implementation 4.1 Modify Database Schema 4.2 Modify Resource Information 4.3 Modify Security System 4.4 Modify IDL 4.5 Modify GUI 4.6 Some ScreenShots 5. Conclusion and Future Work 6. Reference 1
3 Abstract Role-based access control has been introduced along with claims that its mechanisms are general enough to incorporate the traditional access control models: mandatory access control (MAC) and discretionary access control (DAC). This report provides a realization of mandatory access control in an existing role-based security system by labeling all users with clearances and all other data objects with classifications. Implementation steps are presented and future direction is discussed. 1. Introduction Role based access control (RBAC) has recently received considerable attention, particularly for commercial sectors. Under the RBAC framework, users are granted membership into roles based on their competencies and responsibilities in the organization. This simplifies the administration and management of privileges; roles can be updated without updating the privileges for every user on an individual base. Role-based Access is generally recognized as being the most flexible form of access control [4,5]. Traditional mandatory access control (MAC) is associated with military or sensitive national security information and incorporates the policy of onedirectional information flow in a lattice. Mac is not as flexible as RBAC, yet MAC features are often required in, for example, military operations, where the flexibility of RBAC is also beneficial. Since the introduction of RBAC, researchers have discussed the relationship between RBAC and these traditional models [4] and attempted approaches on configuring RBAC to enforce MAC and DAC models. Nyanchama [2] proposes a number of access constraints that would realize the equivalent of Bell and LaPadula read- 2
4 down and write-up rules. Sandhu [8] attests the flexibility of RBAC and its ability to accommodate MAC policies by suitable configuration of role hierarchies and constraints. This paper introduces the implementation of mandatory access control in an existing role-based security system. In section 2, we will review the MAC and RBAC models. Section 3 discusses framework of the existing role-based security system. Section 4 presents the detailed implementation of MAC in a RBAC system. Section 5 offers conclusion and future directions. 2. Access Control Models 2.1 Mandatory Access Control Mandatory access control, which, according to the United States Department of Defense Trusted Computer System Evaluation Criteria is a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (e.g. clearance) of subjects to access information of such sensitivity. Clearance is the security level to which and individual user or client can access information. This clearance is usually associated with a need to know requirement. We will use the following four security clearance values according to National Security Information: Top Secret (T): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security. Secret (S): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally serious damage to the national security. 3
5 Confidential (C)): shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally damage to the national security. Unclassified (U): no security restriction Classification is the security level given to information based on policy, We will use the same classification levels used for clearances to assign classifications. Clearance and classification go together, in that, a user s clearance is a limit to the access of information based on the information s classification. Classification relation is null < U < C < S < T. Each security level is said to dominate itself and all others below it in this hierarchy. The concept of mandatory access control was first formalized by Bell and LaPadula Model [4, 7]. The Bell-LaPadula Model supports mandatory access control by determining the access rights from the security levels associated with subjects and objects. The following two rules define the mandatory access: Simple-security property (ss-property): A subject can read an object only if the security level of the subject is higher or equals to the security of the object (readdown) *.property: A subject can write on an object only if the security level of the object is higher or equals to the security level of the subject. (write up) MAC policy compares the sensitivity label at which the user is working to the sensitivity label of the object being accessed and refuses access unless certain MAC checks are passed. It is usually assumed that the security labels on subjects and objects, once assigned, cannot be changed (except by the security administrator). This assumption 4
6 is known as tranquility[6]. This is the reason that MAC is mandatory. With mandatory controls, only administrators and not owner of resources may make decisions that bear on or derive from policy. Only an administrator may change the category of a resource, and on one may grant a right of access that is explicitly forbidden in the access control policy. MAC requires all those who create, access and maintain information to follows rules set by administrator. 2.2 Role-based Access Control RBAC regulates a user s access to certain resources based on a user role. A user role is a collection of permissions the user needs to accomplish that role. A user may have multiple roles, with each role having a set of permissions. The major advantage of role-based system is flexibility[1,9]. Role-based approach to protection and management of system privilege offers more flexibility than other systems such as multilevel security (the most common approach of MAC) and DAC, while proving similar levels of protection for objects in a system. In role-based applications, a user s access rights can be varied via different means. For instance, revoking a user s authorization to a role takes away the privileges in that role from the user. Fine-grained privilege management can be realized by removing/adding privileges associated with a given role. Another advantage of role-based system relates to the granularity of system privilege management. Given that system privileges can be as fine-grained as one can choose, roles offer a means for their incremental management. 5
7 2.3 Combination of MAC and RBAC Role-base access control eases the administration of privileges due to the flexibility with which roles can be configured and reconfigured. With roles, we can enforce the principle of least privilege where a role is assigned only sufficient functionality to realize the intended duty requirements [2]. Traditional role-based security finds application in environments where the greater concern is information integrity as opposed to secrecy [2]. Yet this does not preclude the exploitation of the advantages of role-based protection to realize secrecy. With additional rules on update and read operations, and the information they access, we can realize the requirements of mandatory access control, or MAC. It s out intention to demonstrate that a MAC-like level of protection can be realized using role-based security. 3. Framework of Existing Role-based Security System 3.1 Software Architecture In Figure 1, we represent the security-related clients and resources that comprise our new system architecture. We have a Unified Security Resource (USR), which provides role-based security support in Distributed Resource Environment (DRE). USR provides four categories of services: 1. Security Policy Services define user roles (UR s), register the resources, services and methods, and grant access to roles for resources, services and/or methods. Security Policy Services also include several methods that are provided for resource servers to publish themselves, their services and methods. 6
8 2. Security Authorization Services are utilized to maintain profiles on the clients (e.g. users, tools, software agents, etc.) that are authorized and actively utilizing nonsecurity services. These services allow a security officer to grant users to roles. 3. Security Registration Services are utilized by clients at start-up time for identity registration (User id, IP address and user role). 4. Security Tracking and Analysis Services are utilized by the security officers to dynamically trace the activities in the security environment and statically analyze the inner method calls of the resource server. Security Policy Client (SPC) Security Authorization Client (SAC) Global Clock Resource (GCR) Unified Security Resource (USR) Security Policy Services Security Authorization Services Security Registration Services Analysis Client Security Tracking and Analysis Java Client Software Agent Wrapped Resource for Legacy Application Lookup Legacy Client Database Client COTS Client Lookup Service General Resource Wrapped Resource for Database Application Wrapped Resource for COTS Application Service Figure 1: Security Clients and Resources in Distributed Environment. The prototype of our system has a USR and three resource systems, Global Clock Resource, Course Database Resource and the Patient Database Resource. Global Clock is a time server that is used to make sure database entries are entered in the proper sequence in a distributed environment. The Course Database Resource comes with a server and a client. In the server, we have three services: Query Services, Registration Service and 7
9 Update Service. Each of these services has a couple of methods. The Course Database Resource Client is used to access USR for registering clients and accessing Course Database Server for actions. The Patient Database Resource comes with a server and a client. In the server, there are three services: Query Services, Update Service and Membership Service. Each of these services has a couple of methods. The Patient Database Resource Client is used to access USR for registering clients and accessing Patient Database Server for actions. 3.2 The Unified Security Resource (USR) The Unified Security Resource (USR) is a repository for all static and dynamic security information on roles, clients, resources, authorizations, etc., and is organized into a set of services, as given in Figure 2. Register Service Register_Resource(R_Id); Register_Service(R_Id, S_Id); Register_Method(R_Id, S_Id, M_Id); Register_Signature(R_Id, S_Id, M_Id, Signat); UnRegister_Resource(R_Id); UnRegister_Service(R_Id, S_Id); UnRegister_Method(R_Id, S_Id, M_Id); Unregister_Token(Token) Query Privileges Service Query_Resource(); Query_Method(R_Id); Query_MethodDesc(Token, R_Id, S_Id, M_Id); Check_Privileges(Token, R_Id, S_Id, M_Id, ParamValueList); User Role Service Create_New_Role(UR_Name, UR_Disc, UR_Id); Delete_Role(UR_Id); Query_Role(UR_Id) SECURITY AUTHORIZATION SERVICES Authorize Role Service Grant_Role(UR_Id, User_Id); Revoke_Role(UR_Id, User_Id); Client Profile Service Verify_UR(User_Id, UR_Id); Query_Client(User_Id); Erase_Client(User_Id); Find_Client(User_Id); Find_All_Clients(); SECURITY POLICY SERVICES Figure 2: The Services of USR. Constraint Service DefineTC(R_Id, S_Id, M_Id, SC); DefineSC(R_Id, S_Id, M_Id, SC); CheckTC(UR_Id, R_Id, S_Id, M_ID, CheckSC(UR_Id, R_Id, S_Id, M_ID, ParamValueList); Grant-Revoke Service Grant_Resource(UR_Id, R_Id); Grant_Service(UR_Id, R_Id, S_Id); Grant_Method(UR_Id, R_Id, S_Id, M_Id); Grant_SC(UR_Id, R_Id, S_Id, M_Id, SC); Grant_TC(UR_Id, R_Id, S_Id, M_Id, TC); Revoke_Resource(UR_Id, R_Id); Revoke_Service(UR_Id, R_Id, S_Id); Revoke_Method(UR_Id, R_Id, S_Id, M_Id); Revoke_SC(UR_Id, R_Id, S_Id, M_Id, SC); Revoke_TC(UR_Id, R_Id, S_Id, M_Id, TC); SECURITY REGISTRATION SERVICES Register Client Service Create_Token(User_Id, UR_Id, Token); Register_Client(User_Id, IP_Addr, UR_Id); UnRegister_Client(User_Id, IP_Addr, UR_Id); IsClient_Registered(Token); Find_Client(User_Id, IP_Addr); SECURITY TRACKING AND ANALYSIS SERVICES Tracking Service Logfile(Log String) Analysis Service Analyze(Java Class File) 8
10 Security Policy Services are utilized to define, track, and modify user roles, to allow resources to register their services and methods (and signatures), and to grant/revoke access by user roles to resources, services, and/or methods with optional time and signature constraints. Security Authorization Services are utilized to maintain profiles on the clients (e.g., users, tools, software agents, etc.) that are authorized and actively utilizing nonsecurity services, allowing a security officer to authorize users to roles with or without time constraints. Security Tracking and Analysis Services are utilized to dynamically track all the activities in the security environment and to statically analyze the inner method calls of the resource system. 4. Implementation We implemented mandatory access control in Patient DB using CORBA. Application (here Patient DB) predefines the security classification (T, S, C, U) for resource, service and method. We define the lowest security level of methods as the service classification level, and the lowest security level of services as the resource classification level. A classification level is assigned to a role when created. And a clearance level is assigned to a user when created. When granted a role, the user should have the equal or higher clearance than the role. 4.1 Modify Database Schema The bolded columns are added to the database table to hold on the security classification or clearance information. 9
11 table users (user_id, passwd, begin_time, end_date, end_time, description, clearance) table role (role_id, description, classification) table res (res_id, begin_date, begin_time, end_date, end_time, description, classification) table service (res_id, service_id, service_name, description, classification) table method (res_id, method_id, method_name, description, classification) table availres(res_id,begin_date,begin_time,end_date, end_time, description, classification) table availservice (res_id, service_id, service_name, description, classification) table availmethod (res_id, method_id, method_name, description, classification) 4.2 Modify Resource Information PDBSourceID.java: assign security classification to resource, service, and method. Unclassified: PatientDB Resource Unclassified: Query Service Classified: Update Service Unclassified: Membership Service Top Secret: writeprescription(), getpresctiption; Secret: getmedicalhistory(), writediagnosis(), getdiagnosis(); Classified: getpaymentmod(), setpaymentmode(); Unclassified: addpatien(), removepatient(), getpatientlist(); PDBCorbaImpl.java: need to modified the parameters of related methods. For example, the bolded column is newly added. _security.resourceregister(pdbresourceid.patient_db_res_name, PDBResourceID.PATIENT_DB_RESOURCE_DESCRIPTION, PDBResourceID.PATIENT_DB_RESOURCE_CLAS); Note: we did not start University Database during the demo because hui only implemented snapshop on PDB. My part could work with University Database also. UDBSourceID.java: assign security classification to resource, service, and method. UDBCorbaImpl.java: need to modified the parameters of related methods. For example, the bolded column is newly added. 4.3 Modify Security System 10
12 SecurityDelegate.java: modify all methods which has parameter changes or the SQL statement querys table which adds new column. SecurityCorbaImpl.java: add following new methods. public String queryresourceclas(string resourceid); public String queryserviceclas(string resourceid, String servicename); public String querymethodclas(string resourceid, int methodid); public String[] queryavailserviceclass(string resourceid); public String[] queryavailmethodclass(string resourceid); public String[] queryregisteredmethodclass (String resourceid); public String[] queryservicemethodclass (String resourceid,in wstring serrviceid); public String[] queryregisteredserviceclass (String resourceid); public String[] queryregisteredresourceclass(); public String queryroleclas (String roleid); public String queryuserclearance (String userid); SecurityCorbaImpl.java: Modify the hasclientright Method to check for MAC after token check 4.4 Modify IDL Add following IDL code to securityserver.idl wstring queryresourceclas(in wstring resourceid); wstring queryserviceclas(in wstring resourceid, in wstring servicename); wstring querymethodclas(in wstring resourceid, in long methodid); seq1_string queryavailserviceclass( in wstring resourceid); seq1_string queryavailmethodclass( in wstring resourceid); seq1_string queryregisteredmethodclass (in wstring resourceid); seq1_string queryservicemethodclass (in wstring resourceid,in wstring serrviceid); seq1_string queryregisteredserviceclass (in wstring resourceid); seq1_string queryregisteredresourceclass(); wstring queryroleclas (in wstring roleid); wstring queryuserclearance (in wstring userid); 4.4 Modify GUI Modify GUI code to allow a security admin to enter classifications for roles, and clearances for users. Modify every GUI tab to allow classification (clearance) information appropriately displayed, and check for MAC. AddMethodToServiceTab.java CreateRoleTab.java GrantIPTab.java 11
13 GrantMethodTab.java GrantResourceTab.java GrantServiceTab.java QueryResourceTab.java QueryRoleTab.java RegisterMethodTab.java RegisterResourceTab.java RegisterServiceTab.java CreateUserTab.java EraseUserTab.java GrantRoleTab.java QueryUserTab.java Modify RefreshThread.java in both Policy and Authorization GUI to make sure the GUI tabs are updated appropriately. 4.5 Some Screenshots When Patient DB server starts, the predefined classification information is loaded. Available resource is displayed with appropriate classification level. 12
14 13
15 Since we use the lowest level of all methods classification as the security level of the service, a method with lower level than the service cannot be added to that service. Query resource result is displayed with classification level. 14
16 Role doctor is created with Top Secret classification. 15
17 Method cannot be granted to the role because its classification level is higher than that of the role. 16
18 User hui is created with Top Secret clearance. 17
19 A lower level user cannot be granted higher level role. 5. Conclusion and Future Work We implemented a realization of mandatory access control in an existing rolebased security system by labeling all users with clearances and all other data objects with classifications. Our approach is to treat clearances and classifications as constraints and it fact, that is what they are. A practical consequence is that it might be better to develop systems that support general RBAC and specialize these to MAC. It is also practical to build rules for adjustment. 18
20 6. Reference 1. Nyanchama, M. & Osborn, S Role-Based Security: Pros, Cons & Some Research Directions. ACM SIGSAC Review, 2(2): 11-17, June Nyanchama, M. & Osborn, S Modeling mandatory access control in role-based security systems. In proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands, Osborn, S Mandatory access control and role-based access control revisited. ACM Trans. Inf. Syst. Secur. 1, 2(Feb.), Osborn, S., Sandhu, R., and Nunawer, Q. Configuring Role-Based Access Control To Enforce Mandatory And Discretionary Access Control Policies. ACM Trans. Info. Syst. Security, 3, 2, Philips, C.E., Ting, T.C. and Demurjian, S.A. Information Sharing and Security in Dynamic Coalitions 6. Sandhu, R.S Lattice-based access control models. IEEE Computer 26, 11, Sandhu, R. S.and Samarati, P Access control: Principles and practice. IEEE Commun. Mag. 32, 9, Sandhu, R.S Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G.Martella, And E. Montoliva, Eds. Springer-Verlag, New York, NY, Sandhu, R.S., Coyne, E.J., Feinstein, H.L., and Youman, C.E. Role-based access control models. Computer, 29:38-47, Feb
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Security System for Patient DB
Security System for Patient DB Final report for CSE367 Fei Gao, Dan Wang and Jin Ma Computer Science & Engineering The University of Connecticut Storrs, CT 06269-3155 {fgao, dwang, jinma}@engr.uconn.edu
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
Incorporating database systems into a secure software development methodology
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic
INFO/CS 330: Applied Database Systems
INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke [email protected] http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be
An Application of Integrating Role and Lattice Based Access Control in Database Engineering
An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics
Part III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES
82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS
Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21
Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
USER ACCESS CONTROL AND SECURITY MODEL
102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap ([email protected], [email protected], [email protected]) Faculty of Computer Science and nformation
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 921-944 (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
Analysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Outline. INF3510 Information Security University of Oslo Spring 2015. Lecture 9 Identity Management and Access Control. The concept of identity
INF50 Information Security University of Oslo Spring 05 Outline Identity and access management concepts Identity management models Access control models (security models) Lecture 9 Identity Management
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project. Presented to the faculty of the Department of Computer Science
OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project Presented to the faculty of the Department of Computer Science California State University, Sacramento Submitted in partial
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Information Security Information & Network Security Lecture 2
1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term 2 Security Policies 3 Introduction So you ve succeeded as SO in convincing people
Secure Database Development
Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object
Apache Sentry. Prasad Mujumdar [email protected] [email protected]
Apache Sentry Prasad Mujumdar [email protected] [email protected] Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
INF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2012 Lecture 8 Identity and Access Management Audun Jøsang Outline Identity and access management concepts Identity management models Access control
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
Security Implications of Distributed Database Management System Models
Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India E-mail: 1 [email protected], 2 [email protected],
INF3510 Information Security University of Oslo Spring 2016. Lecture 9 Identity Management and Access Control
INF3510 Information Security University of Oslo Spring 2016 Lecture 9 Identity Management and Access Control University of Oslo Spring 2016 Outline Identity and access management concepts Identity management
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
HP Quality Center. Upgrade Preparation Guide
HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth
Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines
Research Journal of Applied Sciences, Engineering and Technology 7(18): 3786-3790, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: October 26, 2013 Accepted: December
Customer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6
Trusted RUBIX TM Version 6 Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform Revision 6 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
A Formal Enforcement Framework for Role-Based Access Control using Aspect-Oriented Programming
A Formal Enforcement Framework for Role-Based Access Control using Aspect-Oriented Programming Jaime Pavlich-Mariscal, Laurent Michel and Steven Demurjian Department of Computer Science & Engineering,
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
What is a secret? Ruth Nelson
What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
