Le Lecture 15 15
1
Le Lecture 15 15 Access Control 1 Recall: Secu curity Service - - PowerPoint PPT Presentation
Le Lecture 15 15 Access Control 1 Recall: Secu curity Service ces Confidentiality: to assure information privacy and secrecy Authentication: to assert who created or sent data Integrity: to show that data has not been altered
1
erasure Examples of attacks on Availability: – Denial of Service (DoS) Attacks
– Malware that deletes or encrypts files
2
who can access what, how and when …
3
routers, plotters, disks, processes, etc., etc.,...)
4
5
6
execute, read, append, and write
7
Observe Alter Execute Append Read Write X X X X
rename file in directory
8
9
Who is in charge of setting AC policy?
10
i. Access Control Matrix ii. Capabilities
11
12
Alice Bob
Bill.doc
{read,write} {execute} {execute} {execute,read} {execute,read,write}
Edit.exe Fun.com Subject Object
{0}
Keep access rights to an object with that object:
§
ACL for bill.doc:
§
Bob: read, write
§
ACL for edit.exe:
§
Alice: execute;
§
Bob: execute
§
ACL for fun.com:
§
Alice: execute, read;
§
Bill: execute, read, write
13
policies
14
15
S1 S2 S3 O4 O3 O2 O1 G1 O5
access control
permission to access an object
(owners/objects have to keep track of all issued capabilities)
16
Keep access rights with the subject:
17
18
19
20
the owner/creator of the data
and some objects (e.g., sockets) are unchecked
21
group IDs
22
23
from the system
24
25
More details at: http://selinuxproject.org/~jmorris/lss2011_slides/caseforseandroid.pdf
26
ROLE BASED ACCESS CONTROL (RBAC)
27
role associated with that permission
28
palace weapons uniform
Athos Porthos Aramis
29
Musketeer
palace weapons uniform
Athos Porthos Aramis
palace weapons uniform
Athos Porthos Aramis
30
Musketeer
palace weapons uniform
Athos Porthos Aramis
palace weapons uniform
Athos Porthos Aramis
31
Musketeer
palace weapons uniform
Athos Porthos Aramis
palace weapons uniform
Athos Porthos Aramis
Here RBAC doesn’t work …
32
Musketeer
palace weapons uniform
D'Artagnan
palace weapons uniform
D'Artagnan