Access Control
Access Control
0.29 1 in 1.31010
0.30 1 in 1.5109
0.31 1 in 1.8108
0.32 1 in 2.6107
0.33 1 in 4.0106
0.34 1 in 6.9105
0.35 1 in 1.3105
: equal error rate
distance
Part 2 Access Control 43
Attack on Iris Scan
Good photo of eye can be scanned
o Attacker could use photo of eye
Afghan woman was authenticated by
iris scan of old photo
o Story is here
To prevent photo attack, scanner could
use light to be sure it is a “live” iris
Alice rx rx r rw rw
Alice rx rx r rw rw
Alice rx rx r rw rw
w ---
Bob r file2 Bob r file2
--- r
rw r
Fred r file3 Fred --- file3
r r
Compiler
Alice BILL
Compiler is deputy acting on behalf of Alice
Compiler is confused
o Alice is not allowed to write BILL
Compiler has confused its rights with Alice’s
Part 2 Access Control 60
Confused Deputy
Compiler acting for Alice is confused
There has been a separation of authority
from the purpose for which it is used
With ACLs, difficult to avoid this problem
With Capabilities, easier to prevent problem
o Must maintain association between authority and
intended purpose
o Capabilities make it easy to delegate authority
TOP SECRET
SECRET
Not all classifications are comparable, e.g.,
TOP SECRET {CAT} vs SECRET {CAT, DOG}
Part 2 Access Control 81
MLS vs Multilateral Security
MLS can be used without multilateral security
or vice-versa
But, MLS almost always includes multilateral
Example
o MLS mandated for protecting medical records of
British Medical Association (BMA)
o AIDS was TOP SECRET, prescriptions SECRET
o What is the classification of an AIDS drug?
o Everything tends toward TOP SECRET
o Defeats the purpose of the system!
Multilateral security was used instead
Part 2 Access Control 82
Covert Channel
Bob: Check file Check file Check file Check file Check file
Data: 1 0 1 1 0
Time:
A. Covert_TCP C. Covert_TCP
sender receiver
Part 2 Access Control 91
Inference Control
Internal
Internet Firewall network
physical
Disadvantage link
o Speed
physical
FTP server
WWW server
DNS server
Intranet with
Packet Application Personal
Internet Filter Proxy Firewalls
H0 H1 H2 H3 A0 A1 A2 A3
.10 .40 .40 .10 .10 .40 .30 .20
H0 H1 H2 H3
.10 .40 .38 .12
H0 H1 H2 H3 H0 H1 H2 H3
.10 .40 .40 .10 .10 .38 .364 .156