Artificial Neural Networks in Detection of Apples Damage

Download Report

Transcript Artificial Neural Networks in Detection of Apples Damage

Access Control in
Collaborative Systems
Authors: Emis Simo
David Naco
Information Security - City College
1
Overview


Introduction
Collaborative Access Control



Requirements of Access Control in Collaborative systems
Access Control models







Intermediate Access Controls
The Matrix Access Control
Space Model
Role-Based Access Control (RBAC)
Task-Based Access Control (TBAC)
Team-Based Access Control (TMAC)
Evaluation Criteria
Conclusion
Information Security - City College
2
Introduction




Collaborative systems are becoming used
extensively in the last decade
The aim of such systems is to achieve
communication and collaboration between users
concerned with common tasks
Need of security emerges in such systems
Access control is one the most import aspects of
security in collaborative systems


Not only authentication, but authorization also
Traditional Access Control Models for collaboration,
satisfy requirements??
Information Security - City College
3
Collaborative Access Control
Information Security - City College
4
Intermediate Access Controls

Privileges


If you are allowed to do something in a system, you usually
have a certain level of privilege to be able to use the
operating system functions or perform some actions. This
introduces a concept called least privilege. It requires that a
user be given no more privilege than necessary to perform a
job.
Protection Rings

Protection Rings have been mainly used for integrity
protection. The representative examples are system/user
protection in operating system design and the machine
language protection for microprocessor design.
Information Security - City College
5
Intermediate Access Controls

Intermediate Abilities


Group and Negative Permissions


More flexible and have more internal structure,
convenient for mathematical analysis,
experimental stage
Define group forbiddance of accessing objects
RBAC

Fundamental way of implementing intermediate
layer of various access control policies
Information Security - City College
6
Requirements for Access Control
in Collaborative Systems

Multiple, dynamic user roles


Collaboration rights


The model should allow users access rights to be inferred
from their roles. Moreover, it should allow users to take
multiple roles simultaneously and change these roles
dynamically during different phases of collaboration
operations whose results can affect multiple users should be
protected by collaboration rights
Flexibility

The system should support fine - grained subjects, objects,
and access rights
Information Security - City College
7
Requirements for Access Control
in Collaborative Systems

Easy specification


Efficient storage and evaluation


The storage of access definitions and evaluation of the access
checking rule should be efficient
Automation



Access control models must allow high-level specification of access
rights
Easy to implement access control in multi-user applications.
Performance and resource costs should be kept within acceptable
bounds
Meta-access control

Support for fine-grained protection, assignment of administrators,
joint and multiple ownership issues, and the delegation and
revocation of access rights
Information Security - City College
8
Collaborative Access Control
Models
Information Security - City College
9
Matrix Access Control

Object


Subject





The basic resource entity controlled by the computer.
Entity initiating an activity to objects.
The access matrix is a basic model specifying the
rights that subjects have to objects.
Each subject and object correspond to a row and
column, respectively.
Each cell in the matrix denotes the access authorized
for the object in the column by the subject in the row.
The main objective of the access control system is to
strictly execute the operations imposed by the access
matrix.
Information Security - City College
10
Implementations of Matrix Access
Control


Implementations of Matrix Access Control involve
splitting the matrix in more manageable parts in order
to obtain acceptable performance for the
authorization operations.
Access Control Lists (ACL)



Stores the matrix by columns
Provides convenient access review with respect to the object
Capability Lists (C-Lists)


Stores the matrix by rows
Provides convenient access review with respect to the
subject
Information Security - City College
11
Implementation (Matrix Access
Control) cont
Information Security - City College
12
Shortcomings (Matrix Access
Control)

A collaborative organization ownership might not be
at the discretion of the user:


Change of Responsibilities


The system might own resources.
ACL and C-List lack the ability to support dynamic changes
of access rights.
More sophisticated access policies are difficult to be
provided without access rights that are associated
with a subject's credentials.


Least Privilege
Conflict-of-Interest Rules
Information Security - City College
13
SPACE Model







The basic idea behind this model consists of two
concepts: Boundaries and Access Graph.
Environment is divided into small manageable regions by
boundaries.
In each region, a certain level access control policy is
applied.
Within a region, access control is granted as the same
level.
An access graph is built to summarize the constrains on
movement among regions
Two matrices called adjacency and classification matrices
are created by using standard mathematical means
The two matrices are the kernel of the SPACE model
Information Security - City College
14
SPACE Model
Information Security - City College
15
Shortcomings (SPACE)


Provides navigational access requirements in
collaborative environments and does not provide for
fine-grained control
It is not provably secure



users can create insecure regions
SPACE model lacks the complexity needed for
systems where the level of security provided is
important
Application domain is restricted to systems that can
be represented in terms of regions and boundaries
Information Security - City College
16
Role-Base Access Control
(RBAC)






The fundamental principal of RBAC is that the
decision to allow access to objects is based on the
role of the user
A role can represent specific task competency
RBAC offers a new way of assigning access rights to
individuals in an enterprise
First a role is established and least privileges are
assigned to it. Then an individual derive their access
rights of a role by being assigned to membership of
that role which describes his job or responsibility in
that enterprise
The determination of the role membership is
determined by the organization's security policy
RBAC is flexible and easy to manage
Information Security - City College
17
RBAC
Information Security - City College
18
Shortcomings (RBAC)



In early implementations of RBAC, the set of roles
and the membership functions as well, were defined
early in the life-time of a session
Supports the notion of role activation within sessions,
but it does not go far enough in encompassing the
overall context associated with any collaborative
activity
Traditional RBAC lacks the ability to specify a finegrained control on individual users in certain roles
and on individual object instances.
Information Security - City College
19
Task-Based Access Control
(TBAC)


Extend the traditional access models, by introducing
domains that include task-based contextual
information.
Two basic fundamental abstractions:





Authorization Step
Task Templates
The protection state of each authorization step is
unique and disjoint from the protection states of other
steps.
TBAC recognizes the notion of a life-cycle and
associated processing steps for authorizations.
Dynamically manages permissions as authorizations
progress to completion.
Information Security - City College
20
Shortcomings (TBAC)

Permissions are activated and
deactivated in a just-in-time manner.


Problem: across workflows and race
conditions
Collaborative systems require much
broader definition of context

Nature of collaboration cannot always be
easily partitioned into tasks with usage
counts
Information Security - City College
21
Team Based Access Control
(TMAC)



The model defines the team components as a set of
users in various roles
Team permission is a set of permissions that are
defined across team roles and objects.
Context-Based TMAC (C-TMAC)



Variation of TMAC
Consists of five sets: role, user, context, permission, and
session
Team is used as a context to group users in various roles to
access other contexts that have some resources or
environmental factors such as time and location.
Information Security - City College
22
Shortcomings (TMAC and CTMAC)

The models lack the self administration
of assignment relations between entities


Need to reflect multidimensional
definitions of rich collaborative contexts:
such as: organizational entities, workflow
tasks, groupware's environmental
components
Both models have not yet been fully
developed
Information Security - City College
23
Requirements Satisfaction
Information Security - City College
24
Evaluation Criteria








Simple Mechanism (Expressability)
Groups of Users
Easy of Use
Policy Specifications
Policy Enforcement
Fine-Grained Control
Contextual Information
Active/Passive
Information Security - City College
25
Summary

The traditional Access Models







The Matrix Access Control
Space Model
Role-Based Access Control (RBAC)
Task-Based Access Control (TBAC)
Team-Based Access Control (TMAC)
Not all requirements for Collaborative Access
Control are satisfied by traditional models
Need for new Access Control Models
Information Security - City College
26