specication and enforcement of static specication and
play

Specication and Enforcement of Static Specication and Enforcement of - PowerPoint PPT Presentation

Specication and Enforcement of Static Specication and Enforcement of Static Separation-of-Duty Policies in Usage Control Jianfeng Lu, Ruixuan Li, Zhengding Lu, Ji Jinwei Hu, and Xiaopu Ma i H d Xi M Huazhong University of Science and


  1. Specication and Enforcement of Static Specication and Enforcement of Static Separation-of-Duty Policies in Usage Control Jianfeng Lu, Ruixuan Li, Zhengding Lu, Ji Jinwei Hu, and Xiaopu Ma i H d Xi M Huazhong University of Science and Technology Wuhan, China 1

  2. Outline li Background Background 1 1. Specification of SSoD Policies 2. Enforceability of SSoD Policies E f bilit f SS D P li i 3. 3 Enforcing SSoD Policies by SMEA Constraints 4. Conclusion and Future work 5. 2

  3. Sensitive Task d Background k Alice Carl Bob

  4. Why study SoD in UCON h d i  One of RBAC's great advantages is that SoD rules can  One of RBAC s great advantages is that SoD rules can be implemented in a natural and efficient way  UCON has been considered as the next generation access control model access control model  SSoD is a important type of SoD SS D i i f S D  UCON A is a sub-model of UCON only considering authorizations 4

  5. Our contributions ib i  A set based specification scheme for SSoD  A set-based specification scheme for SSoD  Study the problem of determining whether an SSoD St d th bl f d t i i h th SS D policy is enforceable  Generate SMEA constraints to indirect enforce SSoD policies, by using attribute level SSoD requirements li i b i ib l l SS D i (ASSoD) as an intermediate step from SSoD policies to SMEA constraints to SMEA constraints 5

  6. Related work l d k  SoD can be traced back to 1975 by Saltzer and  SoD can be traced back to 1975 by Saltzer and Schroeder, under the name “separation-of-privilege”  ChineseWall model  Specification:  RCL 2000 specification language  NIST RBAC: SMER && SSoD; DMER&& DSoD 6

  7. Related work l d k  Enforcement:  Enforcement:  Sandhu presented a history-based mechanism for dynamically enforcing SoD dynamically enforcing SoD  Jason employed blacklist to enforce historical constraints Jason employed blacklist to enforce historical constraints  Ninghui Li uses SMER to enforce SSoD (motivated) g ( ) 7

  8. Outline li Background Background 1 1. Specification of SSoD Policies 2. Enforceability of SSoD Policies E f bilit f SS D P li i 3. 3 Enforcing SSoD Policies by SMEA Constraints 4. Conclusion and Future work 5. 8

  9. Specification of SSoD policies ifi i f li i  Three requirements :  Three requirements : ① An SSoD policy must be a high-level requirement ② An SSoD policy must be described in terms of restrictions on permissions restrictions on permissions ③ An SSoD policy must capture restrictions on user set ③ p y p involved in the task 9

  10. Specification of SSoD policies li i f i ifi 10

  11. Outline li Background Background 1 1. Specification of SSoD Policies 2. Enforceability of SSoD Policies E f bilit f SS D P li i 3. 3 Enforcing SSoD Policies by SMEA Constraints 4. Conclusion and Future work 5. 11

  12. Enforceability of SSoD Policies f bili f li i  Example  Example  supervisor is a senior role to both engineer and programmer. 12

  13. Enforceability of SSoD Policies ( (cont.) )  If (I, M) satisfies exactly the requirement of allowed(u, p), we say (I, M) is the threshold attribute set of p 13

  14. Enforceability of SSoD Policies ) (cont.) ( 14

  15. Outline li Background Background 1 1. Specification of SSoD Policies 2. Enforceability of SSoD Policies E f bilit f SS D P li i 3. 3 Enforcing SSoD Policies by SMEA Constraints 4. Conclusion and Future work 5. 15

  16. Enforcing SSoD policies by SMEA Constraints i  Motivated by SMER constraint  SMEA (statically mutually exclusive attribute) constraint 16

  17. SMEA constraints i 17

  18. Translating SSoD Policies to ASSoD Requirements i  ASSoD: attribute level SSoD  ASSoD: attribute-level SSoD 18

  19. Translating SSoD Policies to ASSoD Requirements (cont.) i ( ) 19

  20. Generating SMEA Constraints to Enforce ASSoD Requirements f i 20

  21. Generating SMEA Constraints to Enforce ASSoD Requirements(cont.) f i ( ) 21

  22. Outline li Background Background 1 1. Specification of SSoD Policies 2. Enforceability of SSoD Policies E f bilit f SS D P li i 3. 3 Enforcing SSoD Policies by SMEA Constraints 4. Conclusion and Future work 5. 22

  23. Conclusion l i  The specification and enforcement of SSoD in UCON  The specification and enforcement of SSoD in UCON.  The specification is set based and we show that it has  The specification is set-based and we show that it has simpler syntax than existing approaches  We have studied a number of problems related to generating SMEA constraints for enforcing SSoD policies in UCONA system 23

  24. Future work k  The research of the SSoD policies in UCON onA  The research of the SSoD policies in UCON onA models  DSoD policies 24

  25. Thanks for your attention and have a nice lunch http://idc.hust.edu.cn

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend