Authorization.ppt
《Authorization.ppt》由会员分享,可在线阅读,更多相关《Authorization.ppt(54页珍藏版)》请在麦多课文档分享上搜索。
1、Authorization,Brian Garback,Research Issues,Authentication who are you? quantification of trust levels Mobile devices what capabilities do you have? can wireless be as secure as wired? Authorization given who you are, what can you do? how do we control privileges? Federation how can trust be shared?
2、 how to cross trust domain boundaries?,Itinerary,History of Access Control Role-Based AC Context-Based AC Context-Aware AC Permission Based Delegation Model Authorization Specifications CAAC WS-Policy Implementation XACML SAML Specification-Level Goals,Access Control History,RBAC CBAC CAAC PBDM,Role
3、-Based Access Control,Sandu et al. formalized Role-Based Access Control in 1996User U acting in role R is granted permission P Advantage: greatly improved efficiency Disadvantage: cannot specify fine-grained rules,User,Role,Permission,Context-Based Access Control,What is “context”? Circumstances in
4、which an event occurs,System,Subject,Object,Type Owner,Name Age ID Location,Time Date CPU Load,Context-Based Access Control,Role,User,Advantage: access control is context-aware Disadvantage: this is still a static model,Context,Permission,Constraints,with,has,given,RBAC CBAC CAAC,RBAC and CBAC, even
5、 with extensions, cannot meet the access requirements of modern healthcare environments CAAC is an extension to CBAC that is consistent with implementation via web services CAAC permits dynamic specification and dynamic enforcement of arbitrary access rules Context implementation is separated from t
6、he main business logic of target applications.,Context-Aware Access Control,Presented 2004 by Juhnze Hu Terminology: Data Object: the smallest unit to be accessed in an application Data Type: a group of data objects with the same attributes Data Set: the set of all data objects User Set: the set of
7、potential entities that access the data objects,Definition 1: Context Type,A context type is defined as a property related to every participant in an application when it is running.Context Set: a set of all context types in an application. CS = CT1, CT2 CTn, 1 i n. Context Implementation: a function
8、 of context types defined by CI: CT1 CT2 CTn CT, n 0,Definition 2: Context Constraint,We define a context constraint as a regular expression as follows:Context Constraint := Clause1 Clause2 Clausei Clause := Condition1 Condition2 Conditioni Condition := CT is an element of CS OP is a logical operato
9、r in set , , , , , = VALUE is a specific value of CT,Definition 3: Authorization Policy,An authorization policy as a triple, AP = (S, P, C) where:S: the subject in this policy, which could be a user or a role P: the permission in this policy, which is defined as a pair , where M is an operation mode
10、 defined in READ, APPEND, DELETE, UPDATE and O is a data object or data type C: is a context constraint in this policy,Definition 4: Data Access,We define data access as a triple, DA = (U, P, RC) where:U: a user in the User Set who issues this data access P: the permission this user wants to acquire
11、 RC: the runtime context, a set of values for every context type in the Context SetDA (U, P, RC) is granted iff there exists an AP (S, P, C) st U S & P = P & C is evaluated as true under RC,CAAC Authorization Policy,given,has,S: user or role,P: permission,C: constraint,Clause 1,Clause n,condition,co
12、ndition,context type,contextimplementation,A predicate of,Evaluated by,2004 Security Infrastructure,Quick Review,RBACCBACCAAC: dynamic specification and dynamic enforcement of arbitrary access rules separation of context implementation and the main business logic of target applications.,User,Role,Pe
13、rmission,Role,User,Context,Permission,Constraints,assigned,has,given,assigned,granted,Permission Based Delegation Model,2003: Zhang at GMU Given RBAC as an AC model Delegation of authority is common Need-to-know Separation of duty Rotation of sensitive job position Delegation involves Backup of role
14、 Decentralization of authority Collaboration of work,Delegation History,RBDM0: human human Delegator delegates role membership to a delegatee RDM2000: Role delegation in a role hierarchy and multi-step delegation Unit of delegation is a ROLE! PBDM Supports role and permission level delegation,RBDM S
15、hortcomings,Permission Based Delegation,PBDM0 Summary: Multi-step temporal delegation Two role types: Regular Roles (RR) Temporary Delegation Roles (DTR) Multi-step delegation and revocation Drawbacks: No delegation limitations (risky) No role-hierarchy,PBDM0 RBDM,John creates “D1” John assigns: per
16、mission “change_schedule” to D1 (permission-role) role “PE” to D1 (role-role) John assigns Jenny to D1 (user-role),Permission Based Delegation,PBDM0 Summary: Multi-step temporal delegation Two role types: Regular Roles (RR) Temporary Delegation Roles (DTR) Multi-step delegation and revocation Drawba
17、cks: No admin delegation limitations (risky) No role-hierarchy,PBDM1,Role-layers: Regular Roles (RR) cannot be delegated to other roles or users Delegatable Roles (DBR) permissions can be delegated Delegation Roles (DTR) created by delegatable roles Each user has (RR, DBR) pair = RR in PBDM0 Solves
18、admin issue: Administrative assignment of permissions to roles,PBDM1 Example,John creates a DTR “D2” John assigns “change schedule” to D2 from PL “PE” to D2 John assigns Jenny to D2,PBDM1 Revocation,Individual user can: Remove a user from delegatees Remove parts from the delegation role Admin can: M
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AUTHORIZATIONPPT
