|
Foundations of Security and Access Control in Computing |
|
|
1 | (39) |
|
|
|
1 | (2) |
|
Elements of Systems Security |
|
|
3 | (3) |
|
|
|
3 | (1) |
|
|
|
4 | (1) |
|
Data and Message Security |
|
|
4 | (1) |
|
|
|
5 | (1) |
|
|
|
5 | (1) |
|
|
|
6 | (1) |
|
System Integrity: A Prelude to Security |
|
|
6 | (1) |
|
|
|
7 | (2) |
|
Users, Principals, Subjects, and Objects |
|
|
9 | (1) |
|
Identification and Authentication |
|
|
10 | (3) |
|
Authentication Factors: A Comparison |
|
|
11 | (1) |
|
Multiple-Factor Authentication |
|
|
11 | (2) |
|
Passwords: The Prevalent Authentication Method |
|
|
13 | (1) |
|
Approaches to Reliable Password Management |
|
|
13 | (2) |
|
|
|
13 | (1) |
|
Adding Salt To Password Encoding |
|
|
14 | (1) |
|
|
|
14 | (1) |
|
|
|
15 | (1) |
|
|
|
15 | (2) |
|
|
|
17 | (3) |
|
Content of a Security Context |
|
|
18 | (1) |
|
The Flow of a Security Context |
|
|
19 | (1) |
|
Delegating Security Contexts |
|
|
19 | (1) |
|
|
|
20 | (3) |
|
Reference-Monitor Topology |
|
|
21 | (2) |
|
About Access-Control Policies, Models and Mechanisms |
|
|
23 | (3) |
|
|
|
26 | (1) |
|
Role-Based Access Control |
|
|
26 | (1) |
|
Delegation and Masquerading |
|
|
27 | (1) |
|
The Axiom of Attenuation of Privileges |
|
|
27 | (1) |
|
|
|
27 | (8) |
|
|
|
28 | (1) |
|
The Common Criteria: A Background |
|
|
28 | (1) |
|
Overview of Assurance in the Common Criteria |
|
|
29 | (2) |
|
|
|
31 | (1) |
|
|
|
31 | (1) |
|
|
|
32 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
|
|
33 | (1) |
|
|
|
33 | (2) |
|
About the Confinement Problem |
|
|
35 | (2) |
|
|
|
36 | (1) |
|
|
|
36 | (1) |
|
Security-Design Principles |
|
|
37 | (3) |
|
|
|
37 | (1) |
|
|
|
37 | (1) |
|
|
|
37 | (1) |
|
|
|
38 | (1) |
|
|
|
38 | (1) |
|
|
|
38 | (1) |
|
|
|
39 | (1) |
|
|
|
39 | (1) |
|
Psychological Acceptability |
|
|
39 | (1) |
|
Introduction to Identity-Management Models |
|
|
40 | (33) |
|
|
|
40 | (1) |
|
|
|
41 | (5) |
|
Advantages of the Local-Identity Model |
|
|
42 | (1) |
|
|
|
42 | (1) |
|
|
|
43 | (1) |
|
|
|
43 | (1) |
|
Management Issues in the Local-Identity Model |
|
|
43 | (1) |
|
Password and Attribute Synchronization |
|
|
43 | (1) |
|
|
|
44 | (1) |
|
|
|
44 | (1) |
|
Example: IBM Resource Access-Control Facility |
|
|
44 | (2) |
|
|
|
46 | (1) |
|
|
|
46 | (5) |
|
Foundations of Federated Identity |
|
|
46 | (3) |
|
|
|
49 | (1) |
|
|
|
50 | (1) |
|
|
|
50 | (1) |
|
Profiling by a Third Party |
|
|
50 | (1) |
|
|
|
51 | (3) |
|
Identity Mapping and Synchronization |
|
|
51 | (1) |
|
|
|
51 | (1) |
|
Affiliate Networks (Virtual Directories) |
|
|
52 | (2) |
|
Dynamic Scoping of a Security Context |
|
|
54 | (1) |
|
The XNS Approach to the Global Web Identity |
|
|
54 | (13) |
|
|
|
55 | (4) |
|
|
|
59 | (2) |
|
|
|
61 | (1) |
|
The XNS Identity Document |
|
|
61 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (1) |
|
Cross-Referencing XNS Identities |
|
|
64 | (1) |
|
Forming Trust Relationships in XNS |
|
|
65 | (1) |
|
|
|
66 | (1) |
|
Centralized Enterprise-Level Identity Management |
|
|
67 | (6) |
|
Synchronizing Identity Attributes |
|
|
68 | (1) |
|
Policy-Based Identity Provisioning |
|
|
69 | (1) |
|
Unified Identity-Representation Scheme |
|
|
69 | (1) |
|
Dynamic Definition of Identity Attributes |
|
|
70 | (1) |
|
Decoupled Identity-Representation Scheme |
|
|
70 | (1) |
|
Example: IBM Identity Manager |
|
|
71 | (2) |
|
Elements of Trust Paradigms in Computing |
|
|
73 | (56) |
|
|
|
73 | (1) |
|
A Third-Party Approach to Identity Trust |
|
|
74 | (2) |
|
Kerberos: The Implicit Third-Party Authentication Paradigm |
|
|
76 | (7) |
|
A High-Level View of the Kerberos Protocol |
|
|
77 | (2) |
|
|
|
79 | (1) |
|
A Topology of Kerberos Federations |
|
|
80 | (1) |
|
|
|
80 | (1) |
|
Entitlement Attributes in Kerberos |
|
|
81 | (2) |
|
Explicit Third-Party Authentication Paradigm |
|
|
83 | (1) |
|
The Public-Key Infrastructure Approach to Trust Establishment |
|
|
84 | (22) |
|
Foundations of Public-Key Cryptography |
|
|
85 | (1) |
|
The Problem of Factoring Large Numbers |
|
|
86 | (1) |
|
Computing Discrete Logarithms in a Large Finite Field |
|
|
87 | (1) |
|
Elliptic Curves over Finite Fields |
|
|
88 | (1) |
|
|
|
88 | (1) |
|
|
|
89 | (1) |
|
|
|
89 | (1) |
|
Foundations of Trust in PKI |
|
|
90 | (2) |
|
Identification Links Between a Certificate and a CRL |
|
|
92 | (1) |
|
Protecting the CA Signing Key |
|
|
93 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (3) |
|
|
|
97 | (1) |
|
|
|
98 | (1) |
|
Hub-Based Cross-Certification |
|
|
99 | (1) |
|
|
|
99 | (1) |
|
|
|
100 | (2) |
|
Proxy Certificates: Delegated Impersonation in PKI |
|
|
102 | (1) |
|
The Proxy-Certificate Approach |
|
|
102 | (2) |
|
Elements of the X.509 Proxy Certificate |
|
|
104 | (1) |
|
Computing Trust in Proxy Certificates |
|
|
104 | (2) |
|
Attribute Certificates: Entitlement Management in PKI |
|
|
106 | (3) |
|
Elements of Attribute Certificates |
|
|
106 | (1) |
|
|
|
106 | (1) |
|
|
|
107 | (1) |
|
A Note About AC Attributes |
|
|
108 | (1) |
|
|
|
109 | (1) |
|
Generalized Web-of-Trust Model |
|
|
109 | (2) |
|
Examples of Trust-Exchange Mechanisms Over the Web |
|
|
111 | (18) |
|
|
|
112 | (3) |
|
Identity and Trust Tokens |
|
|
115 | (1) |
|
|
|
115 | (1) |
|
|
|
115 | (1) |
|
Referencing Security Tokens |
|
|
116 | (1) |
|
SAML Approach: Unifying Trust and Identity Constructs |
|
|
116 | (3) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
120 | (1) |
|
Authorization Decision Statement |
|
|
120 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
122 | (1) |
|
Authority Binding Information |
|
|
122 | (1) |
|
|
|
122 | (1) |
|
Other Trust Elements of SAML |
|
|
122 | (1) |
|
A Note on Federated Trust in SAML |
|
|
122 | (1) |
|
|
|
123 | (1) |
|
|
|
123 | (1) |
|
|
|
123 | (2) |
|
|
|
125 | (1) |
|
Example: Cookies Exchanged Between a Client and a Web Server |
|
|
125 | (1) |
|
Issues with Use of Cookies |
|
|
126 | (1) |
|
|
|
127 | (1) |
|
Use of a Public Key on the Client Side |
|
|
127 | (1) |
|
Use of a Public Key on the Server Side |
|
|
128 | (1) |
|
Use of a Shared Secret Key |
|
|
128 | (1) |
|
Mandatory-Access-Control Model |
|
|
129 | (18) |
|
|
|
129 | (1) |
|
Mandatory-Access-Control Theory |
|
|
129 | (10) |
|
|
|
129 | (1) |
|
|
|
130 | (1) |
|
|
|
130 | (1) |
|
|
|
131 | (1) |
|
Lattice-Based Access-Control Models |
|
|
131 | (1) |
|
The Lattice Structure of the Information Flow Model |
|
|
132 | (3) |
|
Implications of the Lattice-Based Flow Model on Access Control |
|
|
135 | (1) |
|
Examples of Lattice-Based Information-Flow Models |
|
|
135 | (2) |
|
The Bell-Lapadula Flow Model |
|
|
137 | (1) |
|
|
|
138 | (1) |
|
Comparing Information Flow in BLP and BIBA Models |
|
|
139 | (2) |
|
Implementation Considerations for the BLP and the Biba Models |
|
|
141 | (1) |
|
Combining the BLP and the Biba Models |
|
|
141 | (3) |
|
On the Mandatory-Access-Control Paradigm |
|
|
144 | (1) |
|
|
|
144 | (3) |
|
|
|
146 | (1) |
|
|
|
146 | (1) |
|
Discretionary-Access Control and the Access-Matrix Model |
|
|
147 | (21) |
|
|
|
147 | (1) |
|
Defining the Access-Matrix Model |
|
|
147 | (1) |
|
Implementation Considerations for the Access Matrix |
|
|
148 | (2) |
|
Resource View of the Access Matrix: Access-Control Lists |
|
|
149 | (1) |
|
Subject View of the Access Matrix: Capabilities |
|
|
149 | (1) |
|
Definitions from the HRU Access-Matrix Model |
|
|
150 | (3) |
|
State Transitions in the HRU Access-Matrix Model |
|
|
151 | (1) |
|
Example: create, confer and remove commands |
|
|
152 | (1) |
|
|
|
153 | (1) |
|
The Safety Problem of the Access-Matrix Model |
|
|
153 | (6) |
|
On the Safety of the Mono-Operational Protection System |
|
|
158 | (1) |
|
The General Safety Problem of the Access-Matrix Model |
|
|
159 | (1) |
|
|
|
160 | (8) |
|
Example: Actions of a Turing Machine |
|
|
161 | (2) |
|
Sketch of Proof for the Undecidability of the General Safety Problem |
|
|
163 | (1) |
|
Mapping an Arbitrary Turing Machine onto the Protection System |
|
|
163 | (1) |
|
Mapping the Actions of the Turing Machine onto Protection Commands |
|
|
164 | (1) |
|
|
|
164 | (1) |
|
|
|
165 | (1) |
|
Maintaining the Same Position |
|
|
166 | (1) |
|
|
|
167 | (1) |
|
The Take-Grant Protection Model |
|
|
168 | (12) |
|
|
|
168 | (1) |
|
Definition of the Take-Grant Model |
|
|
168 | (5) |
|
Example: A Take-Grant Model |
|
|
172 | (1) |
|
Safety in the Take-Grant Model |
|
|
173 | (7) |
|
Determinism of Sharing in the Take-Grant Model |
|
|
175 | (1) |
|
|
|
176 | (1) |
|
|
|
176 | (1) |
|
|
|
176 | (1) |
|
|
|
177 | (3) |
|
The Schematic-Protection Model |
|
|
180 | (10) |
|
|
|
180 | (1) |
|
Overview of the Schematic-Protection Model (SPM) |
|
|
180 | (2) |
|
|
|
182 | (5) |
|
|
|
182 | (2) |
|
|
|
184 | (1) |
|
|
|
184 | (1) |
|
|
|
185 | (1) |
|
|
|
185 | (1) |
|
|
|
186 | (1) |
|
Attenuating Create-Rule of SPM |
|
|
187 | (1) |
|
|
|
187 | (3) |
|
Sharing Across Resource Owners |
|
|
187 | (1) |
|
The Basic Take-Grant Model |
|
|
188 | (2) |
|
Role-Based Access Control |
|
|
190 | (62) |
|
|
|
190 | (2) |
|
|
|
192 | (3) |
|
User, Role, and Permission Associations |
|
|
193 | (1) |
|
RBAC Relationship Reviews |
|
|
194 | (1) |
|
|
|
195 | (13) |
|
|
|
196 | (2) |
|
|
|
198 | (2) |
|
Role Reviews in Hierarchical RBAC |
|
|
200 | (1) |
|
Modeling Hierarchical RBAC Using Role Graphs |
|
|
200 | (1) |
|
Effective and Direct Privileges |
|
|
201 | (1) |
|
Role-Graph Modeling of Generalized Role Inheritance |
|
|
202 | (1) |
|
|
|
203 | (1) |
|
|
|
204 | (1) |
|
|
|
205 | (2) |
|
|
|
207 | (1) |
|
|
|
207 | (1) |
|
RBAC: A Comparative Discussion |
|
|
208 | (16) |
|
Mapping of a Mandatory Policy to RBAC |
|
|
209 | (2) |
|
OSM Mapping of a Confidentiality-Mandatory Policy |
|
|
211 | (1) |
|
|
|
212 | (1) |
|
OSM Mapping of an Integrity-Mandatory Policy |
|
|
213 | (1) |
|
|
|
213 | (1) |
|
RBAC Correspondence to a Mandatory Policy |
|
|
213 | (3) |
|
The OSM Constraints for Mapping RBAC to a Mandatory Policy |
|
|
216 | (1) |
|
|
|
216 | (1) |
|
|
|
216 | (1) |
|
|
|
216 | (1) |
|
Mapping Discretionary-Access Control to RBAC |
|
|
217 | (1) |
|
The Elements of the OSM DAC to RBAC Mapping |
|
|
218 | (1) |
|
|
|
219 | (1) |
|
|
|
220 | (2) |
|
Simulating DAC with Changes to Ownership |
|
|
222 | (1) |
|
Simulating Grant-Dependent Revoke |
|
|
222 | (1) |
|
A Note About the OSM DAC to RBAC Mapping |
|
|
223 | (1) |
|
|
|
224 | (3) |
|
The Osborn Flow-Analysis Algorithm |
|
|
224 | (1) |
|
Example 1: Flow Analysis of a Simple LBAC Scheme |
|
|
225 | (1) |
|
Example 2: Reduction of a Role Hierarchy Governing Read and Write Access |
|
|
226 | (1) |
|
Separation of Duty in RBAC |
|
|
227 | (14) |
|
Elements of Role Conflicts in RBAC |
|
|
229 | (1) |
|
|
|
229 | (1) |
|
|
|
230 | (1) |
|
|
|
230 | (1) |
|
Safety Condition from the Perspective of Conflicting Tasks |
|
|
231 | (1) |
|
Static Separation of Duty |
|
|
231 | (1) |
|
The Effect of Role Hierarchy |
|
|
232 | (1) |
|
Dynamic Separation of Duty |
|
|
233 | (2) |
|
Simple Dynamic Separation of Duty |
|
|
235 | (1) |
|
Object-Based Separation of Duty |
|
|
235 | (2) |
|
Operational Separation of Duty |
|
|
237 | (1) |
|
History-Based Separation of Duty |
|
|
237 | (1) |
|
Example: Dynamic Separation of Duty in a Workflow Ativity |
|
|
238 | (2) |
|
Role Cardinality Constraints |
|
|
240 | (1) |
|
RBAC Consistency Properties |
|
|
241 | (2) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
|
|
242 | (1) |
|
|
|
242 | (1) |
|
|
|
242 | (1) |
|
|
|
242 | (1) |
|
|
|
242 | (1) |
|
|
|
243 | (1) |
|
|
|
243 | (1) |
|
|
|
243 | (1) |
|
The Privileges Perspective of Separation of Duties |
|
|
243 | (3) |
|
Functional Specification for RBAC |
|
|
246 | (6) |
|
|
|
246 | (1) |
|
|
|
247 | (1) |
|
Supporting System Functions |
|
|
247 | (1) |
|
|
|
247 | (1) |
|
Hierarchical RBAC Functions |
|
|
248 | (1) |
|
|
|
248 | (1) |
|
Supporting System Functions |
|
|
249 | (1) |
|
|
|
249 | (1) |
|
Functional Specification for Static Separation-of-Duty Relations |
|
|
249 | (1) |
|
|
|
249 | (1) |
|
Supporting System Functions |
|
|
250 | (1) |
|
|
|
250 | (1) |
|
Functional Specification for Dynamic Separation-of-Duty Relations |
|
|
250 | (1) |
|
|
|
250 | (1) |
|
Supporting System Functions |
|
|
251 | (1) |
|
|
|
251 | (1) |
| References |
|
252 | (6) |
| Index |
|
258 | |