1. Trang chủ
  2. » Công Nghệ Thông Tin

Computer Security: Chapter 7 - Using Trust for Role-Based Access Control (RBAC)

22 58 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 22
Dung lượng 589,99 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Computer Security: Chapter 7 - Using Trust for Role-Based Access Control (RBAC) includes Access Control in Open Systems, Proposed Access Control Architecture, TERM server (Basic, Evidence Model, Architecture, Prototype TERM server).

Trang 1

7 Using Trust for Role-Based Access Control (RBAC)

Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS)

and Department of Computer Sciences

Purdue University http://www.cs.purdue.edu/people/bb bb@cs.purdue.edu

Collaborators in the RAID Lab (http://raidlab.cs.purdue.edu):

Prof. Leszek Lilien (former Post Doc)

Dr Yuhui Zhong (former Ph.D Student)

This research is supported by CERIAS and NSF grants from IIS and ANIR.

Trang 3

1) Access Control in Open Systems (1)

 Open environment (like WWW, WiFi networks)

 Common approach:

credentials

 Problems with credentials

Trang 4

 A solution for problems with credentials:

 Trust should be used by access control mechanisms

 To limit granting privileges to potentially harmful users

 How to establish trust ?

a trust decision?

 Using trust for attribute-based access control

vulnerable to masquerading)

1) Access Control in Open Systems (2)

Trang 5

2.1) Proposed Access Control Architecture - Basics

InformationSystem

Authorized

Users

Other Users

Access ControlMechanism

Trang 6

2.2) Proposed Access Control Architecture - RBAC & TERM Server

 Role-based access control ( RBAC )

 Trust-enhanced role-mapping ( TERM ) server cooperates with RBAC

user TERM  Server

Send roles

RBAC enhanced  Web Server

Trang 7

3.1) TERM Server - Basic Concepts  (1)

 Evidence

 Credentials

 Issuer’s opinion

(recommendation)

 Widely used in daily life

Trang 8

3.1) TERM Server - Basic Concepts (2)

 Trust based on interpretation of observations of users

behaviors

 User’s behavior affected by multiple reasons

 Example: Reasons why a user provides incorrect information

 Dishonesty / Error / Other reasons

 Trust context

 Example: Bob trusts his doctor w.r.t health problems but not w.r.t flying with him

 How to represent contexts?

 How to propagate trust among contexts?

 Trust in a user and issuer (of recommendations)

Trang 9

3.2) TERM Server – Evidence Model (1)

Trang 10

3.2) Evidence Model (2)

 Design considerations:

Evidence type

string, mand}, {department, string, opt}])

Evidence

Trang 11

3.2) Evidence Model (3)

Opinion

Trang 12

3.3) TERM Server Architecture (1)

assigned  roles

users’ 

behaviors 

 credential mgmt

role­assignment  policies specified 

by system  administrators

credentials provided by  third parties or retrieved  from the internet

role  assignment

evidence statement

evidence  statement,  reliability

evidence evaluation issuer’s trust 

user/issuer  information  database

user’s trust  

trust  information mgmt

Component implemented Component partially  implemented a) Credential Management (CM) – simply transforms different formats of credentials

to evidence statements

b) Evidence Evaluation (EE) - evaluates reliability of evidence statements

c) Role Assignment (RA) - maps roles to users based on evidence statements and

role assignment policies

d) Trust Information Management (TIM) - evaluates user/issuer’s trust information

based on direct experience and recommendations

Trang 13

a) CM - Credential Management

 Transforms different formats of credentials to evidence statements

Trang 14

b) EE - Evidence Evaluation

 Develop an algorithm to evaluate reliability of evidence

Issuer’s opinion cannot be used as reliability of evidence

 Two types of information used:

Trang 15

Evidence Evaluation Algorithm

opinion 1>

statement E1

Step2: get the evidence statement about issuer’s testify_trust

E2 = <term_server, issuer, testify_trust, opinion 2> from local database

Trang 16

expected for each evidence statement

 Develop an algorithm to assign roles based on policies

The role is assigned if one of them is satisfied

The policy is satisfied if all units evaluate to True

Trang 17

RA Algorithm for Policy Evaluation

Input: evidence set E and their reliability, role A

Output: true/false

P ← the set of policies whose left hand side is role A

while P is not empty{

q = a policy in P

satisfy = true

for each units u in q{

if evaluate_unit(u, e, re(e)) = false for all evidence statements e in E

Trang 18

RA Algorithm for Unit Evaluation

Input: evidence statement E1 <issuer, subject, evidence, opinion1> and

its reliability RE (E1), a unit of a policy U

Output: true/false

Step1: if issuer does not hold the IssuerRole specified in U or the type

of evidence does not match evidence_type in U then return false

Step2: evaluate Exp of U as follows:

(1) if Exp1 = “Exp2 || Exp3” then

result(Exp1) = max(result(Exp2), result(Exp3)) (2) else if Exp1 = “Exp2 && Exp3” then

result(Exp1) = min(result(Exp2), result(Exp3)) (3) else if Exp1 = “attr Op Constant” then

if Op {EQ, GT, LT, EGT, ELT} then

if “attr Op Constant” = true then result(Exp1) = RE(E1) else result(Exp1) = 0

else if Op = NEQ” then

if “attr Op Constant” = true then result(Exp1) = RE(E1) else result(Exp1) = 1- RE(E1)

Step3: if min(result(Exp), RE(E1)) threshold in U

then output true else output false

Trang 19

d) TIM - Trust Information Management

 Evaluate “current knowledge”

 “Current knowledge:”

 Interpretations of observations

 Recommendations

 Developed algorithm that evaluates trust towards a user

 User’s trustworthiness affects trust towards issuers who introduced user

 Predict trustworthiness of a user/issuer

 Current approach uses the result of evaluation as the prediction

Trang 20

Defining role assignment policies Loading evidence for role assignment

Software: http://www.cs.purdue.edu/homes/bb/NSFtrust.html

3.4) Prototype TERM Server

Trang 21

Our Research at Purdue

NSF, Cisco, Motorola, DARPA

Trust", in Proc of Data Warehouse and Knowledge Management Conference (DaWaK), Sept 2002

Algorithm for Building User-Role Profiles in a Trust Environment", in Proc of DaWaK, Sept 2002

Mobility in Databases and Distributed Systems (MDDS), Prague, Czechia, Sept 2003

Detection", in Proc of DaWaK, Prague, Czech Republic, Sept 2003

Trang 22

THE END

Ngày đăng: 30/01/2020, 10:17

TỪ KHÓA LIÊN QUAN