




已阅读5页,还剩39页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
AnalyzingandSecuringSocialNetworks,Dr.BhavaniThuraisinghamTheUniversityofTexasatDallasLecture#1IntroductiontoDataandApplicationsSecurityJanuary18,2013,Outline,DataandApplicationsSecurityDevelopmentsandDirectionsSecureSemanticWebXMLSecurity;OtherdirectionsSomeEmergingSecureDASTechnologiesSecureSensorInformationManagement;SecureDependableInformationManagementSomeDirectionsforPrivacyResearchDataMiningforhandlingsecurityproblems;Privacyvs.NationalSecurity;PrivacyConstraintProcessing;FoundationsofthePrivacyProblemWhataretheChallenges?,DevelopmentsinDataandApplicationsSecurity:1975-Present,AccessControlforSystemsRandIngres(mid1970s)Multilevelsecuredatabasesystems(1980present)Relationaldatabasesystems:researchprototypesandproducts;Distributeddatabasesystems:researchprototypesandsomeoperationalsystems;Objectdatasystems;Inferenceproblemanddeductivedatabasesystem;TransactionsRecentdevelopmentsinSecureDataManagement(1996Present)Securedatawarehousing,Role-basedaccesscontrol(RBAC);E-commerce;XMLsecurityandSecureSemanticWeb;Dataminingforintrusiondetectionandnationalsecurity;Privacy;Dependabledatamanagement;Secureknowledgemanagementandcollaboration,DevelopmentsinDataandApplicationsSecurity:MultilevelSecureDatabases-I,AirForceSummerStudyin1982EarlysystemsbasedonIntegrityLockapproachSystemsinthemidtolate1980s,early90sE.g.,SeaviewbySRI,LockDataViewsbyHoneywell,ASDandASDViewsbyTRWPrototypesandcommercialproductsTrustedDatabaseInterpretationandEvaluationofCommercialProductsSecureDistributedDatabases(late80stomid90s)Architectures;AlgorithmsandPrototypefordistributedqueryprocessing;Simulationofdistributedtransactionmanagementandconcurrencycontrolalgorithms;Securefederateddatamanagement,DevelopmentsinDataandApplicationsSecurity:MultilevelSecureDatabases-II,InferenceProblem(mid80stomid90s)Unsolvabilityoftheinferenceproblem;Securityconstraintprocessingduringquery,updateanddatabasedesignoperations;SemanticmodelsandconceptualstructuresSecureObjectDatabasesandSystems(late80stomid90s)Secureobjectmodels;Distributedobjectsystemssecurity;Objectmodelingfordesigningsecureapplications;SecuremultimediadatamanagementSecureTransactions(1990s)SingleLevel/MultilevelTransactions;Securerecoveryandcommitprotocols,SomeDirectionsandChallengesforDataandApplicationsSecurity-I,SecuresemanticwebandSocialNetworksSecuritymodelsSecureInformationIntegrationHowdoyousecurelyintegratenumerousandheterogeneousdatasourcesonthewebandotherwiseSecureSensorInformationManagementFusingandmanagingdata/informationfromdistributedandautonomoussensorsSecureDependableInformationManagementIntegratingSecurity,Real-timeProcessingandFaultToleranceDataSharingvs.PrivacyFederateddatabasearchitectures?,SomeDirectionsandChallengesforDataandApplicationsSecurity-II,DataminingandknowledgediscoveryforintrusiondetectionNeedrealisticmodels;real-timedataminingSecureknowledgemanagementProtecttheassetsandintellectualrightsofanorganizationInformationassurance,Infrastructureprotection,AccessControlInsidercyber-threatanalysis,Protectingnationaldatabases,Role-basedaccesscontrolforemergingapplicationsSecurityforemergingapplicationsGeospatial,Biomedical,E-Commerce,etc.OtherDirectionsTrustandEconomics,TrustManagement/Negotiation,SecurePeer-to-peercomputing,CoalitionDataandPolicySharing,Export,Data/Policy,Component,Data/Policyfor,AgencyA,Data/PolicyforFederation,Export,Data/Policy,Component,Data/Policyfor,AgencyC,Component,Data/Policyfor,AgencyB,Export,Data/Policy,OthertopicsofInterest,SecureCloudComputingMobilecodesecurityVulnerabilityAnalysisInfrastructuresecurityPowergridHealthcareSecurityFinancialSecurity,AccessControl,DiscretionaryAccessControlinRelationalDatabasesMandatoryAccessControlinRelationalDatabasesSecurityConstraintsTypesofAccessControlInferenceproblem,Role-based,Temporal,UsageAccessControlinOtherDatabasesObjects,FederatedCurrentTrendsinAccessControlDateWarehousing,SemanticWeb,PrivacyControlNextStepsinAccessControl,AccessControlinRelationalDatabases:1975-Present,AccessControlpoliciesweredevelopedinitiallyforfilesystemsE.g.,Read/writepoliciesforfilesAccesscontrolindatabasesstartedwiththeworkinSystemRandIngresProjectsAccessControlrulesweredefinedfordatabases,relations,tuples,attributesandelementsSQLandQUELlanguageswereextendedGRANTandREVOKEStatementsReadaccessonEMPtoUsergroupAWhereEMP.Salary30KandEMP.DeptSecurityQueryModification:ModifythequeryaccordingtotheaccesscontrolrulesRetrieveallemployeeinformationwheresalary30KandDeptisnotSecurity,QueryModificationAlgorithm,Inputs:Query,AccessControlRulesOutput:ModifiedQueryAlgorithm:GivenaqueryQ,examinealltheaccesscontrolrulesrelevanttothequeryIntroduceaWhereClausetothequerythatnegatesaccesstotherelevantattributesintheaccesscontrolrulesExample:rulesareJohndoesnothaveaccesstoSalaryinEMPandBudgetinDEPTEMP(E#,Ename,Salary,D#),DEPT(D#,Dname,Budg,Mgr)QueryistojointheEMPandDEPTrelationsonDept#ModifythequerytoJoinEMPandDEPTonDept#andprojectonallattributesexceptSalaryandBudgetOutputistheresultingquery,MandatoryAccessControl(MAC)inDatabases:1982-Present,BellandLaPadulaPolicyadaptedfordatabasesReadatorbelowyourlevelandWriteatyourlevel;Granularityofclassification:Databases,Relations,Tuples,Attributes,Elements(Note:writingaboveyourlevelisnotasecurityproblem)SecurityArchitecturesOperatingsystemprovidingmandatoryaccesscontrolandDBMSisuntrustedwithrespecttoMAC(e.g.,SRIsSeaView)TrustedSubjectArchitecturewhereDBMSistrustedwithrespecttoMAC(e.g.,TRWsASDandASDViews)IntegrityLockwhereTrustedfront-endcomputeschecksums(e.g.,MITREsMISTRESSPrototype)DistributedArchitecturewheredataisdistributedaccordingtosecuritylevelsandaccessthroughtrustedfront-end(e.g.,NRLsSINTRA)ExtendedKernelforSecurityPolicyEnforcementsuchasconstraints(e.g.,HoneywellsLockDataViews),SecurityConstraints/AccessControlRules,SimpleConstraint:JohncannotaccesstheattributeSalaryofrelationEMPContent-basedconstraint:IfrelationMISScontainsinformationaboutmissionsintheMiddleEast,thenJohncannotaccessMISSAssociation-basedConstraint:ShipslocationandmissiontakentogethercannotbeaccessedbyJohn;individuallyeachattributecanbeaccessedbyJohnReleaseconstraint:AfterXisreleasedYcannotbeaccessedbyJohnAggregateConstraints:TenormoretuplestakentogethercannotbeaccessedbyJohnDynamicConstraints:AftertheMission,informationaboutthemissioncanbeaccessedbyJohn,EnforcementofSecurityConstraints,UserInterfaceManager,ConstraintManager,SecurityConstraints,QueryProcessor:Constraintsduringqueryandreleaseoperations,UpdateProcessor:Constraintsduringupdateoperation,DatabaseDesignToolConstraintsduringdatabasedesignoperation,Database,RelationalDBMS,OtherDevelopmentsinAccessControl,InferenceProblemandAccessControlInferenceproblemoccurswhenusersposequeriesanddeduceunauthorizedinformationfromthelegitimateresponsesSecurityconstraintprocessingforcontrollinginferencesMorerecentlythereisworkoncontrollingreleaseinformationinsteadofcontrollingaccesstoinformationTemporalAccessControlModelsIncorporatestimeparameterintotheaccesscontrolmodelsRole-basedaccesscontrolControllingaccessbasedonrolesofpeopleandtheactivitiestheycarryout;ImplementedincommercialsystemsPositiveandNegativeAuthorizationsShouldnegativeauthorizationsbeexplicitlyspecified?Howcanconflictsberesolved?,SomeExamples,TemporalAccessControlAfter1/1/05,onlydoctorshaveaccesstomedicalrecordsRole-basedAccessControlManagerhasaccesstosalaryinformationProjectleaderhasaccesstoprojectbudgets,buthedoesnothaveaccesstosalaryinformationWhathappensifthemanagerisalsotheprojectleader?PositiveandNegativeAuthorizationsJohnhaswriteaccesstoEMPJohndoesnothavereadaccesstoDEPTJohndoesnothavewriteaccesstoSalaryattributeinEMPHowareconflictsresolved?,PrivacyConstraints/AccessControlRules,PrivacyconstraintsprocessingSimpleConstraint:anattributeofadocumentisprivateContent-basedconstraint:IfdocumentcontainsinformationaboutX,thenitisprivateAssociation-basedConstraint:Twoormoredocumentstakentogetherisprivate;individuallyeachdocumentispublicReleaseconstraint:AfterXisreleasedYbecomesprivateAugmentadatabasesystemwithaprivacycontrollerforconstraintprocessing,IntegratedArchitectureforPrivacyConstraintProcessing,UserInterfaceManager,ConstraintManager,PrivacyConstraints,QueryProcessor:Constraintsduringqueryandreleaseoperations,UpdateProcessor:Constraintsduringupdateoperation,XMLDatabaseDesignToolConstraintsduringdatabasedesignoperation,Database,RelationalDBMS,OtherPolicies,TrustPoliciesTowhatextentdoyoutrustthesourceofthedataHowcantrustbepropagatedAddingtrustvaluetoeachpieceofdataAtrustsBandBtrustsC,doesthismeanAtrustsC?Adepartmentheadsendsmessagestoallthefaculty;howeverhe/shemaynottrustaparticularpersonDevelopingalanguagetospecifytrustIntegrityPoliciesMaintainingthequalityofthedataAddinganattributetoeachpieceofdatatospecifythequalityQualityalsodependsonhowmuchyoutrustthesourceAlgebrafordataquality,AccessControlinDatabases:NextSteps,AccessControlinDatabaseswillcontinuetobeveryimportantWealsoneedtoexaminealternativesWeneednewkindsofaccesscontrolmodels1975modelsmaynotbesuitableforemergingapplicationssuchassemanticweb,e-commerceandstreamdatamanagementRole-basedaccesscontrolhasbecomeverypopularandisimplementednowincommercialsystems.Whatvariationsofthismodelareappropriateforemergingapplications?End-to-endsecurityiscriticalWecannothavesecuredatabasesandhaveinsecurenetworksandmiddleware;ComposabilityFlexiblesecuritypoliciesConfidentiality,Authenticity,Completeness,Integrity,Trust,Privacy,DataQuality,etc.,Policies,NeedtoKnowtoNeedtoShareRBACUCONABACDisseminationRiskbasedaccesscontrolTrustManagement/Credential/DisclosureDirectionsMajorconferencesforPolicyandAccessControl:IEEEPolicyWorkshopACMSACMAT,NeedtoKnowtoNeedtoShare,Needtoknowpoliciesduringthecoldwar;eveniftheuserhasaccess,doestheuserhaveaneedtoknow?Post9/11theemphasisisonneedtoshareUsermaynothaveaccess,butneedsthedataDowegivethedatatotheuserandthenanalyzetheconsequencesDoweanalyzetheconsequencesandthendeterminetheactionstotakeDowesimplynotgivethedatatotheuserWhatarerisksinvolved?,RBAC,AccesstoinformationsourcesincludingstructuredandunstructureddatabothwithintheorganizationandexternaltotheorganizationAccessbasedonrolesHierarchyofroles:handlingconflictsControlleddisseminationandsharingofthedata,RBAC(Sandhu),UCON,RBACmodelisincorporatedintoUCONandusefulforvariousapplicationsAuthorizationcomponentObligationsObligationsareactionsrequiredtobeperformedbeforeanaccessispermittedObligationscanbeusedtodeterminewhetheranexpensiveknowledgesearchisrequiredAttributeMutabilityUsedtocontrolthescopeoftheknowledgesearchConditionCanbeusedforresourceusagepoliciestoberelaxedortightened,UCON(Sandhu),Role-basedUsageControl(RBUC),RBACwithUCONextension,ReleaseandDisseminationPolicies,ReleasepolicieswilldeterminetowhomtoreleasethedataWhatistheconnectiontoaccesscontrolIsaccesscontrolsufficientOncethedataisretrievedfromtheinformationsource(e.g.,database)shoulditbereleasedtotheuserOncethedataisreleased,disseminationpolicieswilldeterminewhothedatacanbegiventoElectronicmusic,etc.,ABAC:Attribute-basedAccessControl,Userspecifieshis/herattributes(e.g.,gender,citizenship)PolicieswouldspecifyaccessbasedonusercredentialsOpenenvironmentXACML,RiskBasedDataSharing/AccessControl,Whataretherisksinvolvedinreleasing/disseminatingthedataRiskmodelingshouldbeintegratedwiththeaccesscontrolmodelSimplemethod:assignriskvaluesHighertherisk,lowerthesharingWhatisthecostofreleasingthedata?Cost/Risk/Securitycloselyrelated,TrustManagement,TrustServicesIdentifyservices,authorizationservices,reputationservicesTrustnegotiation(TN)Digitalcredentials,DisclosurepoliciesTNRequirementsLanguagerequirementsSemantics,constraints,policiesSystemrequirementsCredentialownership,validity,alternativenegotiationstrategies,privacyExampleTNsystemsKeyNoteandTrust-X(UofMilan),TrustBuilder(UIUC),TrustManagement,Theproblem:establishingtrustinopensystems,Mutualauthentication-Assumptiononthecounterparthonestynolongerholds-Bothparticipantsneedtoauthenticateeachother,?,Interactionsbetweenstrangers-Inconventionalsystemsuseridentityisknowninadvanceandcanbeusedforperformingaccesscontrol-Inopensystemspartecipantsmayhavenopre-existingrelationshipandmaynotshareacommonsecuritydomain,TrustNegotiationmodel,ApromisingapproachforopensystemswheremostoftheinteractionsoccurbetweenstrangersThegoal:establishtrustbetweenpartiesinordertoexchangesensitiveinformationandservicesTheapproach:establishtrustbyverifyingpropertiesoftheotherparty,Trustnegotiation:theapproach,Interactionsbetweenstrangersinopensystemsaredifferentfromtraditionalaccesscontrolmodels,Policiesandmechanismsdevelopedinconventionalsystemsneedtoberevised,USERIDsVS.SUBJECTPROPERTIES,ACCESSCONTROLPOLICIESVS.DISCLOSUREPOLICIES,Subjectproperties:digitalcredentials,AssertionaboutthecredentialownerissuedandcertifiedbyaCertificationAuthority.,CA,CA,Eachentityhasanassociatedsetofcredentials,describingpropertiesandattributesoftheowner.,UseofCredentials,CredentialIssuer,DigitalCredentials,Julie3kidsMarriedAmerican,CompanyA,CompanyB,Wanttoknowcitizenship,Wanttoknowmaritalstatus,-Julie-American,-Julie-Married,Alice,Check,Check,Referencedfrom,Credentials,CredentialscanbeexpressedthroughtheSecurityAssertionMar
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年学历类自考专业(学前教育)幼儿文学-幼儿园组织与管理参考题库含答案解析(5套)
- (2025年标准)药店安保协议书
- 2025年学历类自考专业(学前教育)学前教育心理学-学前儿童美术教育参考题库含答案解析(5套)
- (2025年标准)鲜奶吧协议书
- 2025年学历类自考专业(学前教育)学前心理学-幼儿园教育活动设计与组织参考题库含答案解析(5套)
- 护理需要层次理论
- 2025年黄金买卖服务协议书
- 2025年学历类自考专业(学前教育)-学前儿童游戏指导参考题库含答案解析(5套)
- 2025年学历类自考专业(国贸)涉外经济法-国际商务英语参考题库含答案解析(5套)
- 角的初步认识(教学设计)-2023-2024学年二年级下册数学苏教版
- 2025年江苏劳动保障协理员招聘考试(行政能力测试)历年参考题库含答案详解(5套)
- 呼吸道疾病用药课件
- 2025年军队专业技能岗位文职人员招聘考试(油封员)历年参考题库含答案详解(5套)
- 福建省福州市(八县市)协作校2024-2025学年高一下学期期末考试物理
- 三年级科学实验观察日志范文
- 工业机器人技术及其应用
- 2025年黑龙江省高校大学《辅导员》招聘考试题库及答案
- 2025年中医病因试题及答案大全
- 内科辅助检查技术
- DB 4601∕T 10-2024 二次供水工程技术规范
- 胸部气管损伤的护理课件
评论
0/150
提交评论