Cover image for Access control systems : security, identity management and trust models
Title:
Access control systems : security, identity management and trust models
Personal Author:
Publication Information:
New York, NY : Springer, 2006
ISBN:
9780387004457

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010149791 TK5109.59 B46 2006 Open Access Book Book
Searching...
Searching...
30000010149792 TK5109.59 B46 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.

This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.


Table of Contents

Chapter 1 Foundations of Security and Access Control in Computingp. 1
Introductionp. 1
Elements of Systems Securityp. 3
Identity Establishmentp. 3
Resource Access Controlp. 4
Data and Message Securityp. 4
Nonrepudiationp. 5
Availabilityp. 5
Cost of Securityp. 6
System Integrity: A Prelude to Securityp. 6
Trusted Computing Basep. 7
Users, Principals, Subjects, and Objectsp. 9
Identification and Authenticationp. 10
Authentication Factors: A Comparisonp. 11
Multiple-Factor Authenticationp. 11
Passwords: The Prevalent Authentication Methodp. 13
Approaches to Reliable Password Managementp. 13
Password Encodingp. 13
Adding Salt to Password Encodingp. 14
Password Syntax Rulesp. 14
Password Agingp. 15
Auditingp. 15
The Security Contextp. 17
Content of a Security Contextp. 18
The Flow of a Security Contextp. 19
Delegating Security Contextsp. 19
Access Controlp. 20
Reference-Monitor Topologyp. 21
About Access-Control Policies, Models and Mechanismsp. 23
Access Control Paradigmsp. 26
Role-Based Access Controlp. 26
Delegation and Masqueradingp. 27
The Axiom of Attenuation of Privilegesp. 27
Trust and Assurancep. 27
Realizing Assurancep. 28
The Common Criteria: A Backgroundp. 28
Overview of Assurance in the Common Criteriap. 29
Configuration Managementp. 31
Delivery and Operationp. 31
Developmentp. 32
Guidance Documentsp. 32
Life-Cycle Supportp. 33
Testsp. 33
Vulnerability Assessmentp. 33
About the Confinement Problemp. 35
Covert Channelsp. 36
Examplesp. 36
Security-Design Principlesp. 37
Economy of Mechanismp. 37
Complete Mediationp. 37
Open Designp. 37
Least-Common Mechanismp. 38
Fail-Safe Defaultsp. 38
Separation of Privilegep. 38
Least Privilegesp. 39
Privacy Considerationsp. 39
Psychological Acceptabilityp. 39
Chapter 2 Introduction to Identity-Management Modelsp. 40
Introductionp. 40
Local Identityp. 41
Advantages of the Local-Identity Modelp. 42
Management Issues in the Local-Identity Modelp. 43
Example: IBM Resource Access-Control Facilityp. 44
Network Identityp. 46
Federated Identityp. 46
Foundations of Federated Identityp. 46
Federation Topologiesp. 49
Global Web Identityp. 51
Identity Mapping and Synchronizationp. 51
MetaDirectoriesp. 51
Affiliate Networks (Virtual Directories)p. 52
Dynamic Scoping of a Security Contextp. 54
The XNS Approach to the Global Web Identityp. 54
Elements of DNSp. 55
Elements of XNSp. 59
XNS Identity Typesp. 61
The XNS Identity Documentp. 61
IDs and Names in XNSp. 62
XNS Resolversp. 63
Cross-Referencing XNS Identitiesp. 64
Centralized Enterprise-Level Identity Managementp. 67
Synchronizing Identity Attributesp. 68
Policy-Based Identity Provisioningp. 69
Unified Identity-Representation Schemep. 69
Example: IBM Identity Managerp. 71
Chapter 3 Elements of Trust Paradigms in Computingp. 73
Introductionp. 73
A Third-Party Approach to Identity Trustp. 74
Kerberos: The Implicit Third-Party Authentication Paradigmp. 76
A High-Level View of the Kerberos Protocolp. 77
Federated Kerberosp. 79
A Topology of Kerberos Federationsp. 80
Ticket Forwardingp. 80
Entitlement Attributes in Kerberosp. 81
Explicit Third-Party Authentication Paradigmp. 83
The Public-Key Infrastructure Approach to Trust Establishmentp. 84
Foundations of Public-Key Cryptographyp. 85
Digital Signaturesp. 88
Trusting a Public Keyp. 89
Foundations of Trust in PKIp. 90
PKI Trust Topologiesp. 93
Proxy Certificates: Delegated Impersonation in PKIp. 102
Attribute Certificates: Entitlement Management in PKIp. 106
Elements of Attribute Certificatesp. 106
Generalized Web-of-Trust Modelp. 109
Examples of Trust-Exchange Mechanisms Over the Webp. 111
Web-Services Securityp. 112
SAML Approach: Unifying Trust and Identity Constructsp. 116
Web Cookiesp. 123
Chapter 4 Mandatory-Access-Control Modelp. 129
Introductionp. 129
Mandatory-Access-Control Theoryp. 129
Partial Ordersp. 129
Latticesp. 130
Lattice-Based Access-Control Modelsp. 131
The Lattice Structure of the Information Flow Modelp. 132
Implications of the Lattice-Based Flow Model on Access Controlp. 135
Examples of Lattice-Based Information-Flow Modelsp. 135
The Bell-Lapadula Flow Modelp. 137
The Biba Modelp. 138
Comparing Information Flow in BLP and Biba Modelsp. 139
Implementation Considerations for the BLP and the Biba Modelsp. 141
Combining the BLP and the Biba Modelsp. 141
On the Mandatory-Access-Control Paradigmp. 144
The Chinese-Wall Policyp. 144
Simple securityp. 146
*-propertyp. 146
Chapter 5 Discretionary-Access Control and the Access-Matrix Modelp. 147
Introductionp. 147
Defining the Access-Matrix Modelp. 147
Implementation Considerations for the Access Matrixp. 148
Resource View of the Access Matrix: Access-Control Listsp. 149
Subject View of the Access Matrix: Capabilitiesp. 149
Definitions from the HRU Access-Matrix Modelp. 150
State Transitions in the HRU Access-Matrix Modelp. 151
The Safety Problem of the Access-Matrix Modelp. 153
On the Safety of the Mono-Operational Protection Systemp. 158
The General Safety Problem of the Access-Matrix Modelp. 159
The Turing Machinep. 160
Sketch of Proof for the Undecidability of the General Safety Problemp. 163
Chapter 6 The Take-Grant Protection Modelp. 168
Introductionp. 168
Definition of the Take-Grant Modelp. 168
Example: A Take-Grant Modelp. 172
Safety in the Take-Grant Modelp. 173
Determinism of Sharing in the Take-Grant Modelp. 175
Chapter 7 The Schematic-Protection Modelp. 180
Introductionp. 180
Overview of the Schematic-Protection Model (SPM)p. 180
SPM Rules and Operationsp. 182
The Copy Operationp. 182
The Demand Operationp. 184
The Create Operationp. 185
Attenuating Create-Rule of SPMp. 187
Application of SPMp. 187
Sharing Across Resource Ownersp. 187
The Basic Take-Grant Modelp. 188
Chapter 8 Role-Based Access Controlp. 190
Introductionp. 190
Basic RBACp. 192
User, Role, and Permission Associationsp. 193
RBAC Relationship Reviewsp. 194
Hierarchical RBACp. 195
General-Role Hierarchiesp. 196
Limited-Role Hierarchiesp. 198
Role Reviews in Hierarchical RBACp. 200
Modeling Hierarchical RBAC Using Role Graphsp. 200
RBAC: A Comparative Discussionp. 208
Mapping of a Mandatory Policy to RBACp. 209
RBAC Correspondence to a Mandatory Policyp. 213
Mapping Discretionary-Access Control to RBACp. 217
RBAC Flow Analysisp. 224
The Osborn Flow-Analysis Algorithmp. 224
Separation of Duty in RBACp. 227
Elements of Role Conflicts in RBACp. 229
Static Separation of Dutyp. 231
Dynamic Separation of Dutyp. 233
Role Cardinality Constraintsp. 240
RBAC Consistency Propertiesp. 241
Property 8.1

p. 241

Property 8.2

p. 241

Property 8.3

p. 241

Property 8.4

p. 241

Property 8.5

p. 241

Property 8.6

p. 242

Property 8.7

p. 242

Property 8.8

p. 242

Property 8.9

p. 242

Property 8.10

p. 242

Property 8.11

p. 243

Property 8.12

p. 243

Property 8.13

p. 243

The Privileges Perspective of Separation of Dutiesp. 243
Functional Specification for RBACp. 246
Core RBAC Functionsp. 246
Hierarchical RBAC Functionsp. 248
Functional Specification for Static Separation-of-Duty Relationsp. 249
Functional Specification for Dynamic Separation-of-Duty Relationsp. 250
Referencesp. 252
Indexp. 258