25
April 2008 1 INSTITUTE FOR CYBER SECURITY Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio April 2008

INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

Embed Size (px)

Citation preview

Page 1: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 1

INSTITUTE FOR CYBER SECURITY

Access Control andSemantic Web Technologies

Ravi SandhuExecutive Director and Endowed Chair

Institute for Cyber SecurityUniversity of Texas at San Antonio

April 2008

Page 2: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 2

INSTITUTE FOR CYBER SECURITY Theme

Access control has always had to adjust as new Information Technologies came into play Operating systems Relational DBMSs Object oriented systems XML: XACML, XRML

Therefore, semantic web technologies will also require a change in access control

But in the meantime access control itself has evolved DAC and MAC RBAC Trust Management, Obligations, Attribute-based access

control Policy languages Usage control

So semantic web technologies may also need to change to accommodate some of these developments

Page 3: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 3

INSTITUTE FOR CYBER SECURITY Theme

Security itself has fundamentally changed

Enterprise security Multi-party security

Black-and-white security Gray security

Limited points of access Access anytime anywhere

Engage with one serviceat a time

Engage with multiple servicesconcurrently

Page 4: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 4

INSTITUTE FOR CYBER SECURITY Models versus Policy Languages

Access control models Built on abstractions Incomplete Testable for conformance Guidance for security architects DAC, MAC, RBAC, UCON

Policy languages Specify what authorizations apply under various

circumstances Industry standard: XACML Academic implementation oriented: Ponder Several theoretical languages Semantic web: Kaos, Rei, Rein, KAoS

Need synergy between these two streams of research Models provide a framework but are necessarily incomplete Languages by themselves provide no guidance or framework

Page 5: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 5

INSTITUTE FOR CYBER SECURITY Partners in Crime

Proceedings ACM Symposium on Access Control Models and Technologies

(SACMAT), 2008, to appear

Page 6: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 6

INSTITUTE FOR CYBER SECURITY NIST RBAC Standard Model

Page 7: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 7

INSTITUTE FOR CYBER SECURITY NIST RBAC Standard Model

Page 8: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 8

INSTITUTE FOR CYBER SECURITY NIST RBAC Standard RBAC

Page 9: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 9

INSTITUTE FOR CYBER SECURITY US Persons Role Hierarchy

Page 10: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 10

INSTITUTE FOR CYBER SECURITY ROWLBAC: 2 Approaches

Page 11: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 11

INSTITUTE FOR CYBER SECURITY Common Elements

Page 12: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 12

INSTITUTE FOR CYBER SECURITY Roles as Classes: Role Hierarchies

Page 13: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 13

INSTITUTE FOR CYBER SECURITY Roles as Classes: SSD, DSD

Page 14: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 14

INSTITUTE FOR CYBER SECURITY Roles as Classes: Role-Permission

Page 15: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 15

INSTITUTE FOR CYBER SECURITY Roles as Classes: Enforcing DSD

Page 16: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 16

INSTITUTE FOR CYBER SECURITY Roles as Values

Page 17: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 17

INSTITUTE FOR CYBER SECURITY Roles as Values: Hierarchical Roles

Page 18: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 18

INSTITUTE FOR CYBER SECURITY Roles as Values: SSD, DSD

Page 19: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 19

INSTITUTE FOR CYBER SECURITY Roles as Values: Role Permissions

Page 20: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 20

INSTITUTE FOR CYBER SECURITY Roles as Values: Enforcing RBAC

Page 21: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 21

INSTITUTE FOR CYBER SECURITY ROWLBAC: 2 Approaches

Page 22: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 22

INSTITUTE FOR CYBER SECURITY The UCON Model

Rights(R)

Authorizations

(A)

Subjects(S)

Objects(O)

Subject Attributes (SA) Object Attributes (OA)

Obligations(B)

Conditions(C)

UsageDecisions

before-usage ongoing-Usage after-usage

Continuity ofDecisions

pre-decision ongoing-decision

pre-update ongoing-update post-update

Mutability ofAttributes

• unified model integrating• authorization• obligation• conditions

• and incorporating• continuity of decisions• mutability of attributes

Page 23: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 23

INSTITUTE FOR CYBER SECURITY UCON Extensions

UCON future obligations UCON system obligations

Page 24: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 24

INSTITUTE FOR CYBER SECURITY Unifying Policy Framework

Page 25: INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber

April 2008 25

INSTITUTE FOR CYBER SECURITY Unifying Policy Framework