C. Edward Chow.ppt
《C. Edward Chow.ppt》由会员分享,可在线阅读,更多相关《C. Edward Chow.ppt(43页珍藏版)》请在麦多课文档分享上搜索。
1、C. Edward Chow,Security Policies,CS591 Chapter 5.2/5.4 of Security in Computing,Goals of Confidentiality Policies,Confidentiality Policies emphasize the protection of confidentiality. Confidentiality policy also called information flow policy, prevents unauthorized disclosure of information. Example
2、: Privacy Act requires that certain personal data be kept confidential. E.g., income tax return info only available to IRS and legal authority with court order. It limits the distribution of documents/info.,Discretionary Access Control (DAC),DAC: Mechanism where a user can set access control to allo
3、w or deny access to an object (Section 5.4) Also called Identity-based access control (IBAC). It is a traditional access control techniques implemented by traditional operating system such as Unix. Based on user identity and ownership Programs run by a user inherits all privileges granted to the use
4、r. Programs is free to change access to the users objects Support only two major categories of users: Completely trusted admins Completely untrusted ordinary users,Problems with DAC,Each users has complete discretion over his objects. What is wrong with that? Difficult to enforce a system-wide secur
5、ity policy, e.g. A user can leak classified documents to a unclassified users. Other examples? Only based users identity and ownership, Ignoring security relevant info such as Users role Function of the program Trustworthiness of the program Compromised program can change access to the users objects
6、 Compromised program inherit all the permissions granted to the users (especially the root user) Sensitivity of the data Integrity of the data Only support coarse-grained privileges Unbounded privilege escalation Too simple classification of users (How about more than two categories of users?),Manda
7、tory Access Control (MAC),MAC: Mechanism where system control access to an object and a user cannot alter that access. Occasionally called rule-based access control? Defined by three major properties: Administratively-defined security policy Control over all subjects (process) and objects (files, so
8、ckets, network interfaces) Decisions based on all security-relevant info MAC access decisions are based on labels that contains security-relevant info.,What Can MAC Offer?,Supports a wide variety of categories of users in system. For example, Users with labels: (secret, EUR, US) (top secret, NUC, US
9、). Here security level is specified by the two-tuple: (clearance, category) Strong separation of security domains System, application, and data integrity Ability to limit program privileges Confine the damage caused by flowed or malicious software Processing pipeline guarantees Authorization limits
10、for legitimate users,Mandatory and Discretionary Access Control,Bell-LaPadula model combines Mandatory and Discretionary Access Controls. “S has discretionary read (write) access to O”means that the access control matrix entry for S and O corresponding to the discretionary access control component c
11、ontains a read (write) right. A B C D O Q S read(D) T If the mandatory controls not present, S would be able to read (write) O.,Bell-LaPadula Model,Also called the multi-level model, Was proposed by Bell and LaPadula of MITRE for enforcing access control in government and military applications. It c
12、orresponds to military-style classifications. In such applications, subjects and objects are often partitioned into different security levels. A subject can only access objects at certain levels determined by his security level. For instance, the following are two typical access specifications: “Unc
13、lassified personnel cannot read data at confidential levels” and “Top-Secret data cannot be written into the files at unclassified levels”,Hierarchy of Sensitivities,Informal Description,Simplest type of confidentiality classification is a set of security clearances arranged in a linear (total) orde
14、ring. Clearances represent the security levels. The higher the clearance, the more sensitive the info. Basic confidential classification system:individuals documentsTop Secret (TS) Tamara, Thomas Personnel FilesSecret (S) Sally, Samuel Electronic MailsConfidential (C) Claire, Clarence Activity Log F
15、ilesRestrictedUnclassified (UC) Ulaley, Ursula Telephone Lists,Star Property (Preliminary Version),Let L(S)=ls be the security clearance of subject S. Let L(O)=lo be the security classification of object ). For all security classification li, i=0, k-1, lili+1 Simple Security Condition (Read Down): S
16、 can read O if and only if lo=ls and S has discretionary read access to O. *-Property (Star property) (Write Up): S can write O if and only if ls=lo and S has discretionary write access to O. TS guy can not write documents lower than TS. Prevent classified information leak. No Read UP; No Write Down
17、! But how can different groups communicate?,Basic Security Theorem,Let be a system with secure initial state 0 Let T be the set of state transformations. If every element of T preserves the simple security condition, preliminary version, and the *-property, preliminary version, Then every state i, i
18、0, is secure.,Categories and Need to Know Principle,Expand the model by adding a set of categories. Each category describe a kind of information. These categories arise from the “need to know” principle no subject should be able to read objects unless reading them is necessary for that subject to pe
19、rform its function. Example: three categories: NUC, EUR, US. Each security level and category form a security level or compartment. Subjects have clearance at (are cleared into, or are in) a security level. Objects are at the level of (or are in) a security level.,Security Lattice,William may be cle
20、ared into level (SECRET, EUR) George into level (TS, NUC, US). A document may be classified as (C, EUR) Someone with clearance at (TS, NUC, US) will be denied access to document with category EUR.,NUC, EUR, US,NUC, EUR,NUC, US,EUR, US,NUC,EUR,US,Dominate (dom) Relation,The security level (L, C) domi
21、nates the security level (L, C) if and only if L L and C C Dom dominate relation is false. Geroge is cleared into security level (S, NUC, EUR) DocA is classified as (C, NUC) DocB is classified as (S, EUR, US) DocC is classified as (S, EUR) George dom DocA George dom DocB George dom DocC,New Security
22、 Condition and *-Property,Let C(S) be the category set of subject S. Let C(O) be the category set of object O. Simple Security Condition (no read up): S can read O if and only if S dom O and S has discretionary read access to O. *-Property (no write down): S can write to O if and only if O dom S and
23、 S has discretionary write access to O. Basic Security Theorem: Let be a system with secure initial state 0 Let T be the set of state transformations. If every element of T preserves the simple security condition, preliminary version, and the *-property, preliminary version, Then every state i, i0,
24、is secure.,Allow Write Down?,Bell-LaPadula allows higher-level subject to write into lower level object that low level subject can read. A subject has a maximum security level and a current security level. maximum security level must dominate current security level. A subject may (effectively) decre
25、ase its security level from the maximum in order to communicate with entities at lower security levels. Colonels maximum security level is (S, NUC, EUR). She changes her current security level to (S, EUR). Now she can create document at Major is clearance level (S, EUR).,Data General B2 Unix System,
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CEDWARDCHOWPPT
