meta policies for distributed role based access control
play

Meta-policies for Distributed Role-based Access Control Andrs - PowerPoint PPT Presentation

Meta-policies for Distributed Role-based Access Control Andrs Belokosztolszki, Ken Moody {ab374,km}@cl.cam.ac.uk University of Cambridge, Computer Laboratory, OPERA Policy 2002 1 Outline Role-Based Access Control OASIS


  1. Meta-policies for Distributed Role-based Access Control András Belokosztolszki, Ken Moody {ab374,km}@cl.cam.ac.uk University of Cambridge, Computer Laboratory, OPERA Policy 2002 1

  2. Outline • Role-Based Access Control • OASIS • Meta-Policies – Meta-Policy Types – Compliance • Summary Policy 2002 2

  3. Role-Based Access Control Authorization Activation Roles Privileges Sessions Activation Policy 2002 3

  4. OASIS Rules (Open Architecture for Secure Interworking Services) Activation Rule MC MC MC Prerequisite Environmental Appointment Role Predicates Parameters Parameters Parameters Authorization Rule Policy 2002 4

  5. Administrative Domains Users Admin Policy SLA SLA SLA Policy 2002 5

  6. Problems • SLA maintenance – New domain, change to a domain, … • Policy evolution • Information hiding • Information about the policy • Local Autonomy Policy 2002 6

  7. Meta-Policies • Data types • Objects (privileges) • Functions and Predicates • Roles (parameters) • Appointment Certificates (parameters) • Rules (membership conditions) • Explicit / Implicit • Negation • Constraints (SSoD, …) Policy 2002 7

  8. Meta-Policy Types • Compliance • Interface – For a single domain – Communication with other Domains – Information for users Meta-Pol – Higher level policies – Policy evolution Exp Imp Policy 2002 8

  9. Mappings • Meta-Policies are mapped to Policies – Data-types (one-to-one, one directional) – Functions / Environmental Predicates – Roles / Appointments – Rules – Other Constraints (SSOD, …) • Policy or subset of a policy is considered • Direction of Mappings • Parameters (and constants) Policy 2002 9

  10. Compliance Check • Existence of the mappings • Prerequisite services? • Rules: 1. Translating into policy context 2. Checking explicit rules 3. Checking Implicit rules • Negation (entire policy is considered) 4. Other Constraints • Result: Certificate Policy 2002 10

  11. SLA generation • For Interface Meta-Policies: • Automatic generation Meta-Policy Importing Exporting SLA Policy 2002 11

  12. Implementation Desert: Mapping Editor SLA generator Policy 2002 12

  13. Summary • Meta-Policies (Compliance/Interface) • Implementation (Desert) – Mapping editor – SLA generator Policy 2002 13

  14. Acknowledgement • King’s College Cambridge Graduate Student Fund • Overseas Research Students Award Scheme Policy 2002 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend