The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio September 2008 [email protected] www.profsandhu.com. Advertised title. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
INSTITUTE FOR CYBER SECURITY
1
The ASCAA* PrinciplesApplied to Usage Control
Prof. Ravi SandhuExecutive Director and Endowed Chair
Institute for Cyber SecurityUniversity of Texas at San Antonio
Security trends and change drivers Foundational security assumptions Usage: a fundamental security objective The Usage Control or UCON model The PEI (Policy, Enforcement, Implementation)
framework The ASCAA principles (Abstraction, Separation,
Few standard servicesMany and newinnovative services
We are at an inflection point
INSTITUTE FOR CYBER SECURITY Diffie on Information Security … 2007
“Now we face a new challenge to security, a world of shared computing and web services. As with radio, this technology is too valuable to go unused, By contrast with radio, which could be protected with cryptography, there may be no technology that can protect shared computation to the degree we would call secure today. In a decade or a generation, there may be no secure computing.”
INSTITUTE FOR CYBER SECURITY Butler Lampson Paraphrased (I think)
Computer scientists could never have designed the web because they would have tried to make it work.But the Web does “work.”What does it mean for the Web to “work”?
Security geeks could never have designed the ATM network because they would have tried to make it secure.But the ATM network is “secure.What does it mean for the ATM network to be “secure”?
1. Straight-forward. User has no access to any group documents.
1. Access to current documents only (or)2. Access to current documents and past
documents3. Access can be further restricted with rate
and/or usage limits4. Access can be further restricted on basis of
individual user credentials
1. Past member loses access to all documents (or)2. can access any document created during his membership (or)3. can access documents he accessed during membership (or)4. can access all documents created before he left the group (this
includes the ones created before his join time)5. all subject to possible additional rate, usage and user credential
restrictions
1. No rejoin of past members is allowed, rejoin with new ID (or)2. Past members rejoin the group just like any other user who
has never been a member3. The same access policies defined during his prior membership
should again be enforced (or)4. access policies could vary between membership cycles
Security trends and change drivers Foundational security assumptions Usage: a fundamental security objective The Usage Control or UCON model The PEI (Policy, Enforcement, Implementation)
framework The ASCAA principles (Abstraction, Separation,