© 2005 ravi sandhu administrative scope (best viewed in slide show mode) ravi sandhu laboratory...

16
© 2005 Ravi Sandhu www.list.gmu.edu Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

Upload: jasmine-davies

Post on 26-Mar-2015

219 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

• Jason Crampton and George Loizou. “Administrative scope: A foundation for role-based administrative models.” ACM Transactions on Information and System Security, Volume 6, Number 2, May 2003, pages 201-231.

• Several diagrams and text excerpts are taken directly from this paper.

Page 3: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

Page 4: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Example Hierarchies

Page 5: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

5

© 2005 Ravi Sandhuwww.list.gmu.edu

NotationImmediate children Immediate parents Minimal roles

Maximal roles

Junior roles Senior roles

Page 6: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Four Operations

Page 7: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Semantics of Edge Operations

Page 8: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Edge Insertion Anomaly

YNN

NNY

AddEdge(DSO,PE1,QE1) Y

Page 9: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

Page 10: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Evolving Administrative Scope

Dynamic administrative scopeVersusStatic can-modify

Page 11: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scoper is an immediate child of r’

Page 12: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

12

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA Conditions for Four Operations

• These conditions always apply• RHA1

• Additional conditions may be imposed• RHA2, RHA3, RHA4

Page 13: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

13

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA1

• Regular roles are also administrative roles

• A role administers roles in its administrative scope

• No further conditions

• Too permissive• ED administers E

Page 14: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

14

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA2

• RHA1 plus

• Only roles explicitly designated as administrators can administer• Say DIR, PL1, PL2 but not ED and the others

Page 15: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

15

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3

Page 16: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George

16

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3