ACPT: Access Control Policy Tool
|
|
|
- Dora Shepherd
- 10 years ago
- Views:
Transcription
1 12/10/08 1 Access Control Policy Tool (ACPT) ACPT: Access Control Policy Tool
2 12/10/08 2 Access Control Policy Presently Policy authoring are hand crafted by administrators, and difficult to check for correctness, we need tool for: Composing policy by structure framework Detecting conflicts in policy rules Efficient testing of implementation Policy code generation
3 3 Outline Access Control Policy Tool (ACPT) Overview Approaches Model specification and composition Property verification Policy testing XACML generation Related work Future work 3
4 4 ACPT Overview - Functions Composition Allows specification of policy combinations, rules and properties through model and rule templates. Verification Allows testing and verification of policies against specified properties and reports problems that may lead to security holes. Testing Generates efficient test suites (by applying NIST s combinatorial testing technology) for testing of access control implementation, test suites can be applied to any access control implementation. Policy XACML policy generation. 4
5 12/10/08 5 ACPT Overview - Architecture AC policy author Access Control Policy Tool GUI allows specification of users, user attributes, actions, resources, resources attributes, and properties Templates include: ABAC, Workflow, and Multi-Level GUI AC Model Templates Generates encoded Model XACML policy instance Validates models against properties Model Checker Model Generator Generates test suites.xml Generates combinatorial test array Combinatorial Array Generator Test Suite Generator Test suite
6 ACPT Overview 12/10/08 6
7 7 Approaches: AC Model Specification and Composition Allow to conveniently specify mandatory AC models (as well as AC rules) through pre-defined model templates Allow to create various models by specifying attribute values e.g., role subjects, resources, and actions for RBAC, user and resources ranks for MLS. Combine different AC models or rules into a composed one e.g., combine RBAC with multi-level models. allow to configure model priority for combining models or rules.
8 Approaches: AC Model Specification and Composition - Example 12/10/08 8
9 9 Approaches: Property Verification Conflicts among policy entities and their complexity may leak unauthorized or prohibit authorized access privileges. Convert composed models and user-specified properties to input models and properties for a model checker (e.g., NuSMV). Verify models against specified properties, and report detected property violations.
10 10 Approaches: Property Verification cont. ACPT uses the NuSMV model checker, a wellstructured, flexible, and efficient tool (supporting CTL and LTL model checking) Composed Models in NuSMV Properties in NuSMV NuSVM model checker Detected Property Violations
11 12/10/08 11 Approaches: Property Verification - Example Property specification in ACPT
12 12/10/08 12 Approaches: Property Verification Example cont. Test the property against Policy A combined with Policy B. Combined polices has the priorities of the combined rules. This slide shows the combination of policies, where Policy B has higher priority than policy A
13 12/10/08 13 Approaches: Property Verification Example cont. Test the property against Policy B, the result return true.
14 12/10/08 14 Approaches: Property Verification Example cont. Test the property against Policy A, the result return false with counterexample.
15 15 Approaches: Policy Testing Test Requests Policy Implementation Decisions Expected Decisions Assure correct policy implementations by Test Generation: Generate test requests. Test Execution: Evaluate test requests (against policy implementations) and produce their decisions. Test-Result Evaluation: Check if the decisions are consistent with expected decisions (from properties or manual inspection, etc.). If inconsistent, implementation faults are revealed.
16 16 Approaches: Policy Testing Combinatorial Testing Exhaustive testing is impractical (esp. for large number of AC entities). Generating efficient and effective test suites (from AC models) using Combinatorial Array Generation Technology. Generated test suites can be applied to any access control implementations in practice to find implementation faults
17 17 Approaches: Policy Testing - Combinatorial Test cont. Collect domain variables in AC models and generate efficient test suite automatically to detect faults using NIST combinatorial testing tool (ACTS) inputs: a domain of variables outputs: t-way covering arrays as tests For example, domain of variables: 2 subjects: Faculty and Student 2 actions: write and view 2 resources: grades and records Given the domain, 4 and 8 tests are generated for 2-way and 3- way interactions, respectively <Faculty, grades, write>, <Faculty, records, view >,
18 18 Approaches: Policy Testing - Combinatorial Test cont. Combinatorial tests based on 2-way interactions Combinatorial tests based on 3-way interactions (being exhaustive tests) 18
19 12/10/08 19 Test cases generation: Approaches: Policy Testing Example
20 20 Approaches: XACML Generation Generate XACML policy based on the verified (combined or individual) models and rules.
21 12/10/08 21 Approaches: XACML Generation Example XACML generation:
22 22 Approaches: XACML Generation Example cont. <PolicySet PolicySetId="n" PolicyCombiningAlgId= First-Applicable"> <Target/> <Policy PolicyId= RBAC_school" RuleCombinationAlgId= First-Applicable"> <Target/> <Rule RuleId= 1" Effect="Deny"> <Target> <Subjects><Subject> Student </Subject> <Subject> Secretary </Subject></Subjects> <Resources><Resource> Grades </Resource></Resources> <Actions><Action> Change </Action></Actions> </Target> </Rule> <Rule RuleId= 2" Effect="Permit"> <Target> <Subjects><Subject> Professor </Subject> <Subject> Lecturer </Subject> <Subject> Secretary </Subject></Subjects> <Resources><Resource> Grades </Resource> <Resource> Records </Resource></Resources> <Actions><Action> Change </Action> </Actions> </Target> </Rule> </Policy> <Policy PolicyId= ABAC_school" RuleCombinationAlgId="First-Applicable"> <Target/> <Rule RuleId= 3" Effect="Permit"> <Target> </Target> </Rule> </Policy> </PolicySet> <Subjects><Subject> Jim </Subject></Subjects> <Resources><Resource> Records </Resource></Resources> <Actions><Action> Change </Action> <Action> Read </Action></Actions> Rule 1: A student or secretary can not change grades. Rule 2: A professor, lecturer, or secretary can change grades or records. Rule 3: Jim can change grades or records. RBAC_school policy Policy rules
23 23 Related Work: Compare with Commercial AC Tools A commercial AC policy management tool does not have all the following capabilities that NIST ACPT has: AC model templates for specifying models/polices: ABAC, Multi-Level, and Workflow. Composition of multiple AC models into a composed one, e.g., combine RBAC with MLS models. AC property verification to detect faults in models/policies. Some have only limited SOD (Separation of Duty) check. Test-suite generation for testing AC implementations in real operation environment to detect faults in implementations.
24 24 Future Work Available soon after final Alpha test. Enhance capabilities: -- White-box model/properties verification to verify coverage and confinement of AC rules. -- Additional AC policy templates including dynamic and historical access control models. -- API or mechanism for acquiring or consuming information about users, attributes, resources, etc.
25 25 Questions?
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
HPE PC120 ALM Performance Center 12.0 Essentials
HPE PC120 ALM Performance Center 12.0 Essentials Overview This five-day course introduces students to ALM Performance Center 12.0 and the Virtual User Generator (VuGen) application, which is a scripting
A Comparison of Attribute Based Access Control (ABAC) Standards for Data Services
1 2 3 4 5 6 DRAFT NIST Special Publication 800-178 A Comparison of Attribute Based Access Control (ABAC) Standards for Data Services Extensible Access Control Markup Language (XACML) and Next Generation
Software Defined Radio (SDR) Application Review Guide
Software Defined Radio (SDR) Application Review Guide TCB Workshop October 6, 2009 Jim Szeliga Laboratory Division Office of Engineering and technology Federal Communications Commission Presentation Outline
www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015
www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing
Software Testing Strategies and Techniques
Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
Copyright 2005-2010 Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Quality Management. Lecture 12 Software quality management
Quality Management Lecture 12 Software quality management doc.dr.sc. Marko Jurčević prof.dr.sc. Roman Malarić University of Zagreb Faculty of Electrical Engineering and Computing Department of Fundamentals
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
codebeamer INTLAND SOFTWARE codebeamer Medical ALM Solution is built for IEC62304 compliance and provides a wealth of medical development knowledge
codebeamer Medical ALM Solution is built for INTLAND Traceability matrix Medical wiki Risk management IEC 62304 compliance codebeamer INTLAND codebeamer Medical ALM Solution is built for Medical Device
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
IT3203 Fundamentals of Software Engineering (Compulsory) BIT 2 nd YEAR SEMESTER 3
Fundamentals of Software Engineering (Compulsory) BIT 2 nd YEAR SEMESTER 3 INTRODUCTION This course is designed to provide the students with the basic competencies required to identify requirements, document
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Fuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt [email protected] Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
Classical Software Life Cycle Models
Classical Software Life Cycle Models SWEN 301 Trimester 1, 2015 Lecturer: Dr Hui Ma Engineering and Computer Science Lecture slides make use of material provided on the textbook's companion website Motivation
Service-oriented architectures (SOAs) support
C o v e r f e a t u r e On Testing and Evaluating Service-Oriented Software WT Tsai, Xinyu Zhou, and Yinong Chen, Arizona State University Xiaoying Bai, Tsinghua University, China As service-oriented architecture
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP
P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o
Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software. Version 1.6
Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software Version 1.6 16 th June 2010 Table of Content 1. Versions History...4 2. Overview of the Enterprise
Using Patterns and Composite Propositions to Automate the Generation of Complex LTL
University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
Intland s Medical Template
Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
Access control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
Automated Extraction of Security Policies from Natural-Language Software Documents
Automated Extraction of Security Policies from Natural-Language Software Documents Xusheng Xiao 1 Amit Paradkar 2 Suresh Thummalapenta 3 Tao Xie 1 1 Dept. of Computer Science, North Carolina State University,
Computer Programming & Information Systems BCS451 Virtualization / Cloud Computing. Outline
Computer Programming & Information Systems BCS451 Virtualization / Cloud Computing Professor: Tolga Tohumcu VMware vsphere 5 Install, Configure, Manage Office Location: Whitman 109 E-mail: [email protected]
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
Lecture 1: Introduction to Software Quality Assurance
Lecture 1: Introduction to Software Quality Assurance Software Quality Assurance (INSE 6260/4-UU) Winter 2009 Thanks to Rachida Dssouli for some slides Course Outline Software Quality Overview Software
LR120 LoadRunner 12.0 Essentials
LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
SMS for REST Professional
RockendSMS Enhanced Integration SMS for REST Professional RockendSMS has newly designed and developed an upgrade to the way you send SMS through REST Professional V14 and above (RockendSMS Enhanced Integration).
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Identity Management for Interoperable Health Information Exchanges
Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans
FileMaker Server 9. Custom Web Publishing with PHP
FileMaker Server 9 Custom Web Publishing with PHP 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker,
Digital Design Verification
Digital Design Verification Course Instructor: Debdeep Mukhopadhyay Dept of Computer Sc. and Engg. Indian Institute of Technology Madras, Even Semester Course No: CS 676 1 Verification??? What is meant
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
In this Lecture you will Learn: Implementation. Software Implementation Tools. Software Implementation Tools
In this Lecture you will Learn: Implementation Chapter 19 About tools used in software implementation How to draw component diagrams How to draw deployment diagrams The tasks involved in testing a system
Software Development in the Fields of Embedded Systems, Safety, and Security
Software in the Fields of Embedded Systems, Safety, and Security, Erlangen, May 2007 Maritta Heisel Joint work with Denis Hatebur and Holger Schmidt University Duisburg-Essen, Faculty of Engineering, Department
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
Designing the GIS/Website Interface Millennium Earth Project: A Visual Framework for Sustainable Development (Virtual Global Earth Project)
Designing the GIS/Website Interface Millennium Earth Project: A Visual Framework for Sustainable Development (Virtual Global Earth Project) Table of Contents Summary of the project... 3 Major Tasks...
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3
IDS for SAP Application Based IDS Reporting in the ERP system SAP R/3 1 Research Question How is the performance of this SAP IDS when running with reduction of false positives and anonymization? Hypothesis
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Securing Data in a RHEL SELinux Multi-Level Secure Environment
Securing Data in a RHEL SELinux Multi-Level Secure Environment 201504 MLS Overview Red Hat Enterprise Linux (RHEL) forms the foundation of the Multi-Level Security (MLS) system Security Enhanced Linux
OnePurdue HR Organizational Management. Overview of Organizational Management Objects in SAP
OnePurdue HR Organizational Management Overview of Organizational Management Objects in SAP Version 1 March 2, 2006 GENERAL INFORMATION... 3 ORGANIZATIONAL MANAGEMENT OBJECTS... 3 ORGANIZATIONAL UNITS
Effective Ways to Manage User Life Cycle in Active Directory
Effective Ways to Manage User Life Cycle in Active Directory What s this whitepaper about? Although Active Directory is a powerful and popular directory service, there are significant gaps between its
Course Outline. Fall Session 2015 A03
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance Course Outline Fall Session 2015 A03 Instructor: Campus Office:
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Annual Assessment Report 2013 Department of Design
Annual Assessment Report 2013 Department of Design The Department of Design, within the College of Arts and Letters, offers a Bachelor of Arts in Photography and Interior Design, and a Bachelor of Science
SMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
CS 392/681 - Computer Security. Module 16 Vulnerability Analysis
CS 392/681 - Computer Security Module 16 Vulnerability Analysis Course Policies and Logistics Homework 5 due tonight Homework 6 posted Read Chapter 23 11/13/2003 Module 16 - Vulnerability Analysis 2 Some
CRM 2013 Workflows. Description
CRM 2013 Workflows What can Workflows do? In CRM 2013, there are four types of Processes that can be created. We are covering Workflows today, but here is a brief explanation of each type. Process category
Checklist for Customer Protection Management
Checklist for Customer Protection Management I. Development and Establishment of Customer Management System by the Management Checkpoints - Customer Protection as referred to in this checklist covers (1)
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
The Future of Access Control: Attributes, Automation and Adaptation
Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 [email protected]
Langara College: Criminal Justice Department. Fall 2010 - Criminal Justice 1115 (02): Introduction to the Criminal Justice System
e: Criminal Justice Department Fall 2010 Criminal Justice 1115 (02): Introduction to the Criminal Justice System INSTRUCTOR Ms. Cathy Huth CONTACT [email protected] or 604-323-5363 (only during office
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Resolving problems with SMTP Security Server and CVP operating in Check Point NG
PROFESSIONAL SECURITY SYSTEMS Resolving problems with SMTP Security Server and CVP operating in Check Point NG by Mariusz Stawowski CCSA/CCSE (4.1x, NG) The Check Point FireWall-1 Next Generation (NG)
Model Checking II Temporal Logic Model Checking
1/32 Model Checking II Temporal Logic Model Checking Edmund M Clarke, Jr School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 2/32 Temporal Logic Model Checking Specification Language:
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Qualys Scanning for PCI Devices University of Minnesota
Qualys is the vulnerability scanner that will be used to map and scan devices that are involved in credit card processing to meet the PCI-DSS quarterly internal scan and map requirement. This document
Unit 2.1. Data Analysis 1 - V2.0 1. Data Analysis 1. Dr Gordon Russell, Copyright @ Napier University
Data Analysis 1 Unit 2.1 Data Analysis 1 - V2.0 1 Entity Relationship Modelling Overview Database Analysis Life Cycle Components of an Entity Relationship Diagram What is a relationship? Entities, attributes,
Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Operating System Security
Operating System Security Synthesis Lectures on Information Security, Privacy and Trust Editor Ravi Sandhu, University of Texas, San Antonio Operating System Security Trent Jaeger 2008 Copyright 2008
Metrics in Software Test Planning and Test Design Processes
Master Thesis Software Engineering Thesis no: MSE-2007:02 January 2007 Metrics in Software Test Planning and Test Design Processes Wasif Afzal School of Engineering Blekinge Institute of Technology Box
Object Oriented Analysis and Design and Software Development Process Phases
Object Oriented Analysis and Design and Software Development Process Phases 28 pages Why object oriented? Because of growing complexity! How do we deal with it? 1. Divide and conquer 2. Iterate and increment
Managing PHI in the Cloud Best Practices
Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
HP-UX Role-Based Access Control B.11.31.04 Release Notes
HP-UX Role-Based Access Control B.11.31.04 Release Notes HP Part Number: 5992-0628 Published: June 2007 Edition: E028 Copyright 2001 2007 Hewlett-Packard Development Company L.P. Confidential computer
BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA
Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
