#10-11 Access Control Models
#10-11 Access Control Models
Action Action the subject wants to perform. Read and write are common values.
More complex scenarios, like a bank
transfer, may use multiple attributes such
as “action type=transfer” and
“amount=$500”.
Resource The information asset or object impacted For banking, the resource may be “debit
by the action. account=<your account number>.” In law
firms, a resource could be a document
and an attribute could be “case matter =
100.”
Environment The context in which access is Current time, location from where access
requested. is requested, client type (PC,
smartphone, etc.), type of
communication channel (I.E. protocol or
encryption strength)
Now let’s define the authorization requirements for Jane Doe’s
organization, which we will call The Organization. The
Organization has the following authorization requirements:
Any person must have the same clearance level or higher as the
classification of the document he or she is requesting to view,
must also be working on that project, be a current employee, and
have finished the appropriate training.
Only senior personnel with a top-secret clearance can edit records
that are classified as top secret or below, if they are working on
the project the record is part of, are a current employee, and have
finished the appropriate training.
Junior personnel cannot view top-secret information between
20:00 and 6:00.
Short name Namespace Category Data type Value range
+
Flexibility (For small and medium-sized +
organizations)
Scalability - +
-
Customizing user permissions (Every customization requires +
creating a new role)
Bob rx rx r - -
Alice rx rx r rw rw
Accounting rx rx rw rw r
software
Access control matrix has all relevant info
But how to manage a large access control (AC) matrix?
-Could be 1000’s of users, 1000’s of resources
-Then AC matrix with 1 000 000’s of entries
-Need to check this matrix before access to any resource is
allowed: Hopelessly inefficient
To obtain acceptable performance, split AC into manageable
pieces;
Two ways: by column or by row
ACL: store access control matrix by column
Example: ACL for insurance data is in red
OS Accounti Accounting Insuranc Payroll
ng data e data data
program
Bob rx rx r - -
Alice rx rx r rw rw
Sam rwx rwx r rw rw
Accountin rx rx rw rw r
g software
C-list (Aice) = {(OS,rw), (Acct prog, rw), (Acct data, r), (Insur data,
rw), (payroll data, rw)}
Two resources: Compiler
and Bill file (billing info)
Compiler can write file
Bill
Alice can invoke
compiler with a debug
filename
Alice not allowed to
write to Bill
With Capabilities, easier to prevent problem
Must maintain association between authority and intended
purpose
Capabilities make it easy to delegate authority
C-list (Alice) = {(OS,rw), (Acct prog, rw), (Acct data, r), (Insur
data, rw), (payroll data, rw)}
ACLs
Good when users manage their own files
Protection is data-oriented
Easy to change rights to a resource
Capabilities
Easy to delegate
Easy to add/delete users
Easier to avoid the confused deputy
More difficult to implement
Classification apply to objects
Clearances apply to subjects
US Department of defense uses 4 levels of
classifications/clearances
TOP SECRET
SECRET
CONFIDENTIAL
UNCLASSIFIED
This Model was invented by Scientists David Elliot
Bell and Leonard .J. LaPadula.Thus this model is
called the Bell-LaPadula Model. This is used to
maintain the Confidentiality of Security. Here, the
classification of Subjects(Users) and Objects(Files) are
organized in a non-discretionary fashion, with respect
to different layers of secrecy.
It has mainly 3 Rules:
SIMPLE CONFIDENTIALITY RULE: Simple Confidentiality Rule
states that the Subject can only Read the files on the Same Layer of
Secrecy and the Lower Layer of Secrecy but not the Upper Layer of
Secrecy, due to which we call this rule as NO READ-UP
STAR CONFIDENTIALITY RULE: Star Confidentiality Rule states
that the Subject can only Write the files on the Same Layer of
Secrecy and the Upper Layer of Secrecy but not the Lower Layer of
Secrecy, due to which we call this rule as NO WRITE-DOWN
STRONG STAR CONFIDENTIALITY RULE: Strong Star
Confidentiality Rule is highly secured and strongest which states
that the Subject can Read and Write the files on the Same Layer of
Secrecy only and not the Upper Layer of Secrecy or the Lower Layer
of Secrecy, due to which we call this rule as NO READ WRITE UP
DOWN
This Model was invented by Scientist Kenneth J. Biba.
Thus this model is called Biba Model. This is used to
maintain the Integrity of Security. Here, the
classification of Subjects(Users) and Objects(Files) are
organized in a non-discretionary fashion, with respect to
different layers of secrecy. This works the exact reverse
of the Bell-LaPadula Model.
It has mainly 3 Rules:
SIMPLE INTEGRITY RULE: Simple Integrity Rule states that
the Subject can only Read the files on the Same Layer of
Secrecy and the Upper Layer of Secrecy but not the Lower
Layer of Secrecy, due to which we call this rule as NO READ
DOWN
STAR INTEGRITY RULE: Star Integrity Rule states that
the Subject can only Write the files on the Same Layer of
Secrecy and the Lower Layer of Secrecy but not the Upper
Layer of Secrecy, due to which we call this rule as NO WRITE-
UP
STRONG STAR INTEGRITY RULE
Thank you for attention!