Lecture11 -Access Control
Lecture11 -Access Control
Access Control
4.1 - Access Control Principles
• In a broad sense, all of computer security is concerned with access
control
Memory
Segments
addressing
& pages
hardware
Terminal
& device Terminal
manager & devices
Instruction
decoding Instructions
hardware
grant a to Sn, X (Sk, grant, a, Sn, X)
Sk
delete b from Sp, Y (Sm, delete, b, Sp, Y) Access
Sm matrix
monitor
Access
write matrix read
Read Own
User C Read Read
Write Write
(a) Access matrix
File 4 B C
Own (c) Capability lists for files of part (a)
R R
W
•
ss
as
s
as
a
cl
cl
cl
r
er
ne
⚫ Member of a primary group
u
ro
th
w
O
O
identified by a group ID rw- r-- ---
⚫ Belongs to a specific group user: :rw-
group::r--
⚫ 12 protection bits other::---
⚫ Specify read, write, and execute
(a) Traditional UNIX approach (minimal access control list)
permission for the owner of the
file, members of the group and
all other users
s
as
s
as
as
cl
cl
cl
⚫ The owner ID, group ID, and
er
ne
u
ro
th
w
protection bits are part of the file’s
O
inode rw- rw- ---
user: :rw-
masked user:joe:rw-
Traditional UNIX File Access Control
⚫ “Set user ID”(SetUID)
⚫ “Set group ID”(SetGID)
⚫ System temporarily uses rights of the file owner/group in addition to the real user’s rights
when making access control decisions
⚫ Enables privileged programs to access files/resources not generally accessible
⚫ Sticky bit
⚫ When applied to a directory it specifies that only the owner of any file in the directory can
rename, move, or delete that file
⚫ Superuser
⚫ Is exempt from usual access control restrictions
⚫ Has system-wide access
4.3 - Mandatory Access Control (MAC)
Role 1
Role 2
Role 3
U1
U2
U3
U4
U5
U6
Um
OBJECTS
R1 R2 Rn F1 F1 P1 P2 D1 D2
RBAC1 RBAC2
Role hierarchies Constraints
RBAC RBAC0
Base model
(RH) Role
Hierarchy Oper-
ations
user_sessions session_roles
Objects
Sessions
Director
Engineer 1 Engineer 2
Engineering Dept
Mutually exclusive
Cardinality Prerequisite roles
roles
• A user can only be • Setting a maximum • Dictates that a user
assigned to one role in number with respect can only be assigned
the set (either during a to roles to a particular role if it
session or statically) is already assigned to
• Any permission (access some other specified
right) can be granted role
to only one role in the
set
Case Study: RBAC System for a Bank
Table 4.4
Functions and Roles for Banking Example
Human Resources Department Application Administration
Roles
User
IDs Functions
1 1-4 N M Access
Application
Right
Assigns
Positions
Authorization Administration
N M
Role Application
Main obstacle to
its adoption in Web services
real systems has have been
Can define
been concern pioneering
authorizations There is
about the technologies
that express Strength is its considerable
performance through the
conditions on flexibility and interest in
impact of introduction of
properties of expressive applying the
evaluating the eXtensible
both the power model to cloud
predicates on Access Control
resource and the services
both resource Markup
subject
and user Language
properties for (XAMCL)
each access
Attribute-Based Access Control (ABAC)
ABAC 2a
2d
Scenario Rules
1
Enforce
Decision
3
Object
Access Control
2b Mechanism
Subject
2c
Clearance
Name Owner
Type
Affiliation
Etc. Classification
Etc.
Subject Attributes
ObjectAttributes