1 / 19

Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way

Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way. Prof. Ravi Sandhu George Mason University www.list.gmu.edu. AUTHORIZATION, TRUST AND RISK. Information security is fundamentally about managing authorization and trust so as to manage risk. THE OM-AM WAY. A s s

jamescwebb
Download Presentation

Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University www.list.gmu.edu

  2. AUTHORIZATION, TRUST AND RISK • Information security is fundamentally about managing • authorization and • trust so as to manage risk

  3. THE OM-AM WAY A s s u r a n c e What? Objectives Model Architecture Mechanism How?

  4. LAYERS AND LAYERS • Multics rings • Layered abstractions • Waterfall model • Network protocol stacks • Napolean layers • RoFi layers • OM-AM • etcetera

  5. What? How? OM-AM AND MANDATORY ACCESS CONTROL (MAC) A s s u r a n c e No information leakage Lattices (Bell-LaPadula) Security kernel Security labels

  6. What? How? OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC) A s s u r a n c e Owner-based discretion numerous numerous ACLs, Capabilities, etc

  7. What? How? OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC) A s s u r a n c e Objective neutral RBAC96, ARBAC97, etc. user-pull, server-pull, etc. certificates, tickets, PACs, etc.

  8. DISTRIBUTED RBAC (DRBAC)CASE STUDY • Approximately a dozen physical sites • Approximately 2-3 simulation models/site • Fewer than 100 roles structured in a very shallow hierarchy • A subset of roles is used in any single simulation model • Fewer than 100 users • A user uses only one role at a time • Convenient but not critical • Moderate rate of change

  9. DISTRIBUTED RBAC (DRBAC)CASE STUDY • Permission-role assignment • Locally determined at each simulation model • User-role assignment • A user can be assigned to a role if and only if all simulation models using that role agree • A user is revoked from a role if and only if any simulation model using that role revokes the user

  10. DISTRIBUTED RBAC (DRBAC)CASE STUDY • Each simulation model has a security administrator role authorized to carry out these administrative tasks • A simulation model can assign permissions to a role X at any time • even if X is previously unused in that simulation model • Consequently any simulation model can revoke any user from any role!

  11. ... RBAC3 ROLE HIERARCHIES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS ROLES PERMISSIONS SESSIONS CONSTRAINTS

  12. MODEL CUSTOMIZATION • Each session has a single role • SM = {sm1, …, smk}, simulation models • OP = {op1, …, opl}, operations • P= SM X OP, permissions • SMA = {sma1, …, smk}, administrative roles • R  SMA =  • Admin: SM  SMA

  13. MODEL CUSTOMIZATION • Can formalize the administrative rules given earlier • For each simulation model designate a unique user to be the chief security administrator who is authorized to assign and revoke users from the security administrator role for that model

  14. DRBAC ARCHITECTURES • Permission-role • Enforced locally at each simulation model • Permission-role administration • Enforced locally at each simulation model • May need to communicate to other simulation models • User-role • See following slides • User-role administration • Centralized or decentralized

  15. SERVER MIRROR Client Server User-role Authorization Server

  16. SERVER-PULL Client Server User-role Authorization Server

  17. USER-PULL Client Server User-role Authorization Server

  18. PROXY-BASED Client Proxy Server Server User-role Authorization Server

  19. THE OM-AM WAY A s s u r a n c e What? Objectives Model Architecture Mechanism How?

More Related