80 likes | 207 Views
OM-AM and RBAC. Ravi Sandhu * www.list.gmu.edu Laboratory for Information Security Technology (LIST) George Mason University. THE OM-AM WAY. A s s u r a n c e. Objectives Model Architecture Mechanism. What?. How?. What?. How?. OM-AM AND MANDATORY ACCESS CONTROL (MAC). A s
E N D
OM-AM and RBAC Ravi Sandhu* www.list.gmu.edu Laboratory for Information Security Technology (LIST) George Mason University
THE OM-AM WAY A s s u r a n c e Objectives Model Architecture Mechanism What? How?
What? How? OM-AM AND MANDATORY ACCESS CONTROL (MAC) A s s u r a n c e No information leakage Lattices (Bell-LaPadula) Security kernel Security labels
What? How? OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC) A s s u r a n c e Owner-based discretion numerous numerous ACLs, Capabilities, etc
What? How? OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC) A s s u r a n c e Objective neutral RBAC96, ARBAC97, etc. user-pull, server-pull, etc. certificates, tickets, PACs, etc.
Server-Pull Architecture Client Server User-role Authorization Server
User-Pull Architecture Client Server User-role Authorization Server
Proxy-Based Architecture Client Proxy Server Server User-role Authorization Server