13
Community Centric Community Centric Access Control Access Control Matt Guidry Matt Guidry Jacob Rettig Jacob Rettig

Community Centric Access Control

  • Upload
    warren

  • View
    27

  • Download
    0

Embed Size (px)

DESCRIPTION

Community Centric Access Control. Matt Guidry Jacob Rettig. Boolean Identity Verification. Password-based Authentication is not truly compatible with human behavior. Humans are not good at remembering passwords. ‘E=MC3’ ?!. Helpful Measure. Community Centric Access Control - PowerPoint PPT Presentation

Citation preview

Page 1: Community Centric Access Control

Community Centric Community Centric Access ControlAccess Control

Matt GuidryMatt GuidryJacob RettigJacob Rettig

Page 2: Community Centric Access Control

Boolean Identity Boolean Identity VerificationVerification

• Password-based Authentication is Password-based Authentication is not truly compatible with human not truly compatible with human behavior.behavior.

– Humans are not good at remembering passwordsHumans are not good at remembering passwords‘E=MC3’ ?!

Page 3: Community Centric Access Control

Helpful MeasureHelpful Measure• Community Centric Access ControlCommunity Centric Access Control

- Vanilla Authentication- Vanilla Authentication

• Allow Trusted Members in a Small Allow Trusted Members in a Small Community to Admit Access Community to Admit Access

Page 4: Community Centric Access Control

Vanilla AccessVanilla Access

““I cant log in!”I cant log in!”““This stupid thing forgot MY This stupid thing forgot MY

password!”password!”

• Allows Limited AccessAllows Limited Access• Peers Can Let You In, Rollback Peers Can Let You In, Rollback

AccessAccess

Page 5: Community Centric Access Control

Vanilla Rollback AccessVanilla Rollback Access

• Once You Are Verified You Attain Once You Are Verified You Attain “Rollback Access”“Rollback Access”

• Your community members have the Your community members have the second half of your secret keysecond half of your secret key

Page 6: Community Centric Access Control

ExampleExample

• Jenn updates to the new Community Jenn updates to the new Community Centric protocol her company installedCentric protocol her company installed

• 10 digit password10 digit password– Cant be a wordCant be a word– Must have special charsMust have special chars– Must have a numberMust have a number

Page 7: Community Centric Access Control

Treats and ResponsesTreats and Responses

• LazinessLaziness-Send detailed information such -Send detailed information such

a a tokens or pictures tokens or pictures• MisuseMisuse

-Notifies of Vanilla Access -Notifies of Vanilla Access AttemptsAttempts

Page 8: Community Centric Access Control

Community Access Community Access Control to Control to

Physical/Binary DataPhysical/Binary Data

Page 9: Community Centric Access Control

University ExampleUniversity ExampleSome situations may require specific Some situations may require specific

people to be present to access people to be present to access informationinformation

• May require a professor and a secretary to read a file.May require a professor and a secretary to read a file.• May require a professor and a department chair to remove May require a professor and a department chair to remove

the file and/or update it.the file and/or update it.

Page 10: Community Centric Access Control

• Files contained in a smart filing cabinet Files contained in a smart filing cabinet inside a common office space.inside a common office space.

• Professor A must pass through the doors Professor A must pass through the doors and the occupied space of the workplace.and the occupied space of the workplace.

Page 11: Community Centric Access Control

• Professor A reaches the cabinet and pulls on the Professor A reaches the cabinet and pulls on the drawer and a touch screen LCD pops out of the drawer and a touch screen LCD pops out of the top of the cabinet and requires user verification top of the cabinet and requires user verification (security badge, fingerprint).(security badge, fingerprint).• The LCD reminds him he The LCD reminds him he

alone is not authorized to access alone is not authorized to access this information, and that he this information, and that he must access it in conjunction must access it in conjunction with other members of his with other members of his community.community.• He selects an option on the He selects an option on the touch screen to see combinations touch screen to see combinations of community users that will of community users that will unlock the drawer and finds the unlock the drawer and finds the assembly of himself and:assembly of himself and:

–a secretary will together have a secretary will together have permission to read the filespermission to read the files–the department chair will the department chair will together have permission to together have permission to remove the filesremove the files

Page 12: Community Centric Access Control

• Supervised AccessSupervised Access– Professor A wants to make sure these files are what he is looking for.Professor A wants to make sure these files are what he is looking for.– He finds the secretary and together they open the drawer.He finds the secretary and together they open the drawer.– Professor A is able to examine the files while the secretary is present Professor A is able to examine the files while the secretary is present

to supervise.to supervise.

• Supervisory AccessSupervisory Access– Professor A now must ask the department chair to assist him in Professor A now must ask the department chair to assist him in

checking out the files for update.checking out the files for update.– After a legitimate reason, they together open the drawer.After a legitimate reason, they together open the drawer.

• Unsupervised AccessUnsupervised Access– Upon returning the files late that evening, he tries to open the Upon returning the files late that evening, he tries to open the

drawer and checks the community combinations and there are none drawer and checks the community combinations and there are none since they left for the night.since they left for the night.

– Rather than leave them unsecured, he goes to the secure drop-box Rather than leave them unsecured, he goes to the secure drop-box drawer, swipes his finger, and drops them in the drawer.drawer, swipes his finger, and drops them in the drawer.

– In the morning an authorized Information Clearing Agent will verify In the morning an authorized Information Clearing Agent will verify the integrity of the file, and return the file to the correct drawer.the integrity of the file, and return the file to the correct drawer.

Page 13: Community Centric Access Control

Binary DataBinary Data• For sensitive files it is best to follow For sensitive files it is best to follow

the physical data model with an on-the physical data model with an on-location secure terminal connected location secure terminal connected by intranet and without internet.by intranet and without internet.

• In off location community access In off location community access control, the advantages of person to control, the advantages of person to person verification are less or even person verification are less or even lost.lost.