Chapter 6 Ac Mac Dac Brac Abac
Chapter 6 Ac Mac Dac Brac Abac
08/10/2024 2
1
08/10/2024
08/10/2024 3
Authentication Authorization
Who are you?
How much can you spend?
Accounting
What did you spend it on?
08/10/2024 4
2
08/10/2024
08/10/2024 5
08/10/2024 8
3
08/10/2024
The process:
o a computer system controls the interaction between
users and system resources
To implement a security policy, which may be
determined by
o organisational requirements
o statutory requirements (ex, medical records)
Policy requirements may include
o confidentiality (restrictions on read access)
o integrity (restrictions on write access)
o availability
4
08/10/2024
08/10/2024 11
08/10/2024 12
5
08/10/2024
08/10/2024 13
App1
Database
App2
6
08/10/2024
7
08/10/2024
8
08/10/2024
9
08/10/2024
10
08/10/2024
11
08/10/2024
Tasks include
o Creation of new objects and subjects
o Deletion of objects and subjects
o Changing entries in access control matrix (changing entries in
ACLs and capability lists)
Challenges:
o extremely time-consuming, complicated and error-prone
To simplify the administrative burden: need aggregate
subjects and objects are used
Aggregation techniques
o User groups
o Roles
o Procedures (policies)
o Data types
12
08/10/2024
User
User Attribute Object
Group
User Group Has
Access To Objects
With the Attribute
User Object
13
08/10/2024
Role:
o Permissions are assigned to roles
o Users are assigned to roles
o Roles are (usually) arranged in a hierarchy
Ex:
Perm-Role Assignment
User-Role Assignment
Role
Perm Object
User
08/10/2024 30
14
08/10/2024
MAC
DAC
RBAC
08/10/2024 31
15
08/10/2024
16
08/10/2024
17
08/10/2024
18
08/10/2024
39
19
08/10/2024
20
08/10/2024
21
08/10/2024
L1 dominates L2
L2 dominates L1
22
08/10/2024
Introduce in 1973
Main Objective:
o Enable one to formally show that a computer system can
securely process classified information
47
Subjects Objects
Current
Accesses
Trusted
Subjects
Access Matrix
48
23
08/10/2024
49
24
08/10/2024
Objects
Highest
Can Write
Max Level
Subject
Can Read
Lowest
08/10/2024 52
25
08/10/2024
MLS
o security levels
o security categories: Also known as compartments
o security labels = Levels P (Categories)
Define an ordering relationship among Labels
o (e1, C1) (e2, C2) iff. e1 e2 and C1 C2
Secret, {}
26
08/10/2024
● no read-up
● no write-down
TS
Read-down rule (simple security property) User with label L1 can read document
with label L2 only when L1 dominates L2
Write-up rule (star property) User with label L1 can write document with label L2
when L1 is dominated by L2
True
False
True
False
27
08/10/2024
Example:
●Integrity level could be high, medium or low
●Compartment could be similar to BLP and captures
topic(s) of document
●Low integrity information should never flow up into
high integrity documents
28
08/10/2024
The user can access any object as long as he/she has not accessed an
object from another company in the same conflict class.
● Functional correctness
● Does what it was designed to do
● Maintains data integrity
● Even for bad input
● Protects disclosure of sensitive data
Trusting Software: ● Does not pass to untrusted software
● Confidence
● Experts analyze program & assure trust
● Statement giving security we expect system to enforce
● Do this formally when and where possible
29
08/10/2024
30
08/10/2024
RBAC Model:
the system decides exactly which users are allowed to
access which resources—but the system does this in a
special way
08/10/2024 66
31
08/10/2024
08/10/2024 67
32
08/10/2024
Role hierarchy
o Problem: does organizational hierarchy correspond to a permission
inheritance hierarchy?
o Problem: do organizational roles make sense for building hierarchies?
Constraints
o Problem: constraints apply to all states, so they require a predicate
calculus in general
o Problem: Only certain types of constraints can effectively be
administered? Mutual exclusion, separation of duty, cardinality, etc.
Conflicts
o May find other concepts useful for resolving conflicts between
constraints and hierarchies/assignments
- An RBAC system contains the four types of entities (the minimum functionality
for an RBAC system):
• User: An individuals - access to this computer system
• Role: job function - controls this computer system
• Permission: approval of access to one or more objects
• Session: : A mapping between a user and
an activated subset of the set of roles
to which the user is assigned
33
08/10/2024
08/10/2024 71
08/10/2024 72
34
08/10/2024
Roles implemented in
o Window NT (as global and local groups)
o IBM’s OS/400
o Oracle 8 onwards
o .NET framework
There is no generally accepted standard for
RBAC
o Role hierarchies
o Semantics of role hierarchies
35
08/10/2024
36
08/10/2024
37
08/10/2024
08/10/2024 79
An access by a subject to an
object proceeds according to
the following steps:
o 1. A subject requests access to an
object. This request is routed to
an access control mechanism.
o 2. The AC mechanism is
governed by a set of rules:
• (2a) that are defined by a
preconfigured access control policy.
• Based on these rules, the AC
mechanism assesses the attributes
of the subject (2b), object (2c), and
current environmental conditions
(2d) to determine authorization.
08/10/2024 80
38
08/10/2024
08/10/2024 81
08/10/2024 82
39
08/10/2024
08/10/2024 83
08/10/2024 84
40
08/10/2024
08/10/2024 85
41
08/10/2024
42
08/10/2024
Commands:
o List: net user, net localgroup
o Change the permisions
LABChapter 6
08/10/2024 90
43