Bài giảng Bảo mật cơ sở dữ liệu: Chapter 3 - Trần Thị Kim Chi
lượt xem 4
download
Bài giảng "Bảo mật cơ sở dữ liệu - Chương 3: Access Control Discretionary Access Control" trình bày 2 nội dung chính là Access Control và Discretionary Access Control. Đây là một tài liệu hữu ích dành cho các bạn sinh viên ngành Công nghệ thông tin dùng làm tài liệu học tập và nghiên cứu.
Bình luận(0) Đăng nhập để gửi bình luận!
Nội dung Text: Bài giảng Bảo mật cơ sở dữ liệu: Chapter 3 - Trần Thị Kim Chi
- apter 3 Access Control Discretionary Access Control
- Agenda 1. Access Control 2. Discretionary Access Control
- Access Control “Access control” is where security engineering meets computer science. Its function is to control which (active) subject have access to a which (passive) object with some specific access operation. Access Reference object subject request monitor
- Access Control Determine whether a principal can perform a requested operation on a target object – Principal: user, process, etc. – Operation: read, write, etc. – Object: file, tuple, etc. Lampson defined the familiar access matrix and its two interpretations ACLs and capabilities [Lampson70]
- Why are we still talking about access control? An access control policy is a specification for an access decision function The policy aims to achieve – Permit the principal’s intended function (availability) – Ensure security properties are met (integrity, confidentiality) • Limit to “Least Privilege,” Protect system integrity, Prevent unauthorized leakage, etc. • Also known as ‘constraints’ Enable administration of a changeable system (simplicity)
- Example: Access Control Prof Alice manages access to course objects ‣ Assign access to individual (principal: Bob) ‣ Assign access to aggregate (coursestudents) ‣ Associate access to relation (students(course)) ‣ Assign students to project groups (student(course, project, group)) Prof Alice wants certain guarantees ‣ Students cannot modify objects written by Prof Alice ‣ Students cannot read/modify objects of other groups Prof Alice must be able to maintain access policy ‣ Ensure that individual rights do not violate guarantees ‣ However, exceptions are possible – students may distribute their results from previous assignments for an exam
- Access Control is Hard Because Access control requirements are domainspecific – Generic approaches overgeneralize Access control requirements can change – Anyone could be an administrator The Safety Problem [HRU76] – Can only know what is leaked right now Access is failsafe, but Constraints are not – And constraints must restrict all future states
- Safety Problem Determine if an unauthorized permission is leaked given – An initial set of permissions and – An access control system, mainly administrative operations For a traditional approach, the safety problem is undecidable – Access matrix model with multioperational commands – Main culprit is create – create object/subject with own rights – Prove reduction of a Turing machine to the multioperational access matrix system
- Safety Problem Result led to Safe, but limited models: takegrant, schematic protection model, typed access matrix model Further support for models in which the constraints are implicit in the model – e.g., lattice models Check safety on each policy change – constraint approach of RBAC
- Compare to Other CS Problems Processor design – Hard, but can get some smart people together to construct one, fixed, testable design Network protocol design – TCP: A small number of control parameters necessary to manage all reasonable options, within a layered architecture – Constraints, such as DDoS, are ad hoc Software design – Specific goals in mind to achieve function, constraints are ad hoc
- Access Control Models Discretionary Access Matrix – UNIX, ACL, various capability systems Mandatory (Usually) Access Matrix – TE, RBAC, groups and attributes, parameterized Plus Transitions – DTE, SELinux, Java Lattice Access Control Models – BellLaPadula, Biba, Denning Predicate Models – ASL, OASIS, domainspecific models, many others Safety Models – Takegrant, Schematic Protection Model, Typed Access Matrix
- Administration Discretionary Access Control – Users (typically object owner) can decide permission assignments Mandatory Access Control – System administrator decides on permission assignments Flexible Administrative Management – Access control models can be used to express administrative privileges
- Type Enforcement [BoebertKain84]
- Group and Attributes
- Access Control Discretionary Access Control – Access Matrix Model – Implementation of the Access Matrix – Vulnerabilities of the Discretionary Policies – Additional features of DAC
- Discretionary Access Control • Discretionary Access Control is an individual user can set an access control mechanism to allow or deny access to an object. • Relies on the object owner to control access. • DAC is widely implemented in most operating systems, and we are quite familiar with it. • Strength of DAC: Flexibility: a key reason why it is widely known and implemented in mainstream operating systems.
- Discretionary Access Control v Access to data objects (files, directories, etc.) is permitted based on the identity of users. v Explicit access rules that establish who can, or cannot, execute which actions on which resources. v Discretionary: users can be given the ability of passing on their privileges to other users, where granting and revocation of privileges is regulated by an administrative policy.
- Discretionary Access Control v DAC is flexible in terms of policy specification v This is the form of access control widely implemented in standard multiuser platforms Unix, NT, Novell, etc.
- Limitation of DAC Global policy: DAC let users to decide the access control policies on their data, regardless of whether those policies are consistent with the global policies. Therefore, if there is a global policy, DAC has trouble to ensure consistency. Information flow: information can be copied from one object to another, so access to a copy is possible even if the owner of the original does not provide access to the riginal copy. This has been a major concern for military. Malicious software: DAC policies can be easily changed by owner, so a malicious program (e.g.,a downloaded untrustworthy program) running by the owner can change DAC policies on behalf of the owner. Flawed software: Similarly to the previous item, flawed software can be “instructed” by attackers to change its DAC policies.
- Discretionary Access Control Access control matrix – Describes protection state precisely – Matrix describing rights of subjects – State transitions change elements of matrix State of protection system – Describes current settings, values of system relevant to protection
CÓ THỂ BẠN MUỐN DOWNLOAD
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 1 - Trần Thị Kim Chi
195 p | 241 | 42
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 5 - Trần Thị Kim Chi
136 p | 159 | 27
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 2 - Trần Thị Kim Chi
177 p | 145 | 23
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 6 - Trần Thị Kim Chi
171 p | 111 | 23
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 3 - Trần Thị Kim Chi
130 p | 117 | 22
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 4 - Trần Thị Kim Chi
115 p | 122 | 19
-
Bài giảng Bảo mật hệ thống thông tin: Chương 8 - ĐH Bách khoa TP HCM
31 p | 130 | 18
-
Bài giảng Bảo mật cơ sở dữ liệu: Discretionary Access Control - Trần Thị Kim Chi
138 p | 226 | 17
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 8 - Trần Thị Kim Chi
70 p | 150 | 17
-
Bài giảng Bảo mật hệ thống thông tin: Chương 10 - ĐH Bách khoa TP HCM
64 p | 140 | 15
-
Bài giảng Bảo mật hệ thống thông tin: Chương 7 - ĐH Bách khoa TP HCM
70 p | 126 | 15
-
Bài giảng Bảo mật hệ thống thông tin: Chương 6 - ĐH Bách khoa TP HCM
44 p | 110 | 13
-
Bài giảng Bảo mật cơ sở dữ liệu: Chapter 7 - Trần Thị Kim Chi
49 p | 95 | 9
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 9 - Trần Thị Kim Chi (Phần 1)
117 p | 85 | 9
-
Bài giảng Bảo mật cơ sở dữ liệu: Chương 3 - Trần Thị Kim Chi (tt)
59 p | 91 | 8
-
Bài giảng Bảo mật cơ sở dữ liệu: Security methods for statistical databases - Trần Thị Kim Chi
24 p | 81 | 6
-
Bài giảng Bảo mật cơ sở dữ liệu: Security models - Trần Thị Kim Chi
141 p | 81 | 6
Chịu trách nhiệm nội dung:
Nguyễn Công Hà - Giám đốc Công ty TNHH TÀI LIỆU TRỰC TUYẾN VI NA
LIÊN HỆ
Địa chỉ: P402, 54A Nơ Trang Long, Phường 14, Q.Bình Thạnh, TP.HCM
Hotline: 093 303 0098
Email: support@tailieu.vn