16
© 2005 Ravi Sandhu www.list.gmu.edu Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

© 2005 Ravi Sandhu Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

Embed Size (px)

Citation preview

Page 1: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope (continued)(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

2

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA Conditions for Four Operations

• These conditions always apply• RHA1

• Additional conditions may be imposed• RHA2, RHA3, RHA4

These are allowed to be

Page 3: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

3

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA: Add role Y with no children (scope PL1)

Y

Page 4: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

4

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA: Insert edge ENG1, Y (scope PL1)

Y

Page 5: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

5

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA: Delete edge ENG1, Y (scope PL1)

Y

• outside scope of PL1• so cannot get back to childless Y

Page 6: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

6

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA: Add role Y with no parents (scope PL1)

scope of PL1

scope of DIR

Page 7: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

7

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA: Add role Y with no parents (scope PL1)

Y

scope of PL1

scope of DIR

Page 8: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

8

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA Conditions for Four Operations

• These conditions always apply• RHA1

• Additional conditions may be imposed• RHA2, RHA3, RHA4

These are allowed to be

May not be a good idea, especially for parents

Page 9: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

9

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3

Page 10: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

10

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3

Page 11: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

11

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3: Administrative Scope

Page 12: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

12

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3

S+(PSO1)

S+(DSO)

Page 13: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

13

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3: PSO1 creates Y

S+(PSO1)

S+(DSO)

Y

Page 14: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

14

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3: Consistency Constraints

Page 15: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

15

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA4: admin-authority operations

Page 16: © 2005 Ravi Sandhu  Administrative Scope (continued) (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology

16

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA4: creation of parentless roles not allowed

Forces PSO1 as administrator of X

Should be DSO?

Eliminated from admin-hierarchy