ACCESS CONTROL GOAL

Developed and Presented By Dr. Mehrdad Sepehri SharbafCSUDHComputer Science Department

http://csc.csudh.edu/

The some of the materials are excerpted from Michael T. Goodrich & Roberto Tamassia’s Book, and Ross Anderson’s Book

http://www.csudh.edu/univadv/dateline/archives/20080725/facstaffnews/branding_03.jpg

ACCESS CONTROL

ACCESS CONTROL

ACCESS CONTROL

TOPIC: ACCESS CONTROL

  • Which users can read/write which files?
  • Are my files really safe?
  • What does it mean to be root?
  • What do we really want to control?
  • 03/11/2025

    5

    ACCESS CONTROL MATRICES

    6

    EXAMPLE ACCESS CONTROL MATRIX

    7

    ACCESS CONTROL LISTS

    8

    /etc/passwd

    /usr/bin/

    /u/roberto/

    /admin/

    root: r,w,x

    backup: r,x

    root: r,w,x

    roberto: r,w,x

    backup: r,x

    root: r,w,x

    mike: r,x

    roberto: r,x

    backup: r,x

    root: r,w

    mike: r

    roberto: r

    backup: r

    CAPABILITIES

    9

    /etc/passwd: r,w,x; /usr/bin: r,w,x;

    /u/roberto: r,w,x; /admin/: r,w,x

    root

    /usr/passwd: r; /usr/bin: r;

    /u/roberto: r,w,x

    roberto

    /usr/passwd: r; /usr/bin: r,x

    mike

    backup

    /etc/passwd: r,x; /usr/bin: r,x;

    /u/roberto: r,x; /admin/: r,x

    10

    ACCESS CONTROL MODELS

    C:\Documents and Settings\goodrich\Local Settings\Temporary Internet Files\Content.IE5\TAQOHR0Z\MP900390562[1].jpg

    11

    THE BELL-LA PADULA MODEL

    12

    THE BELL-LA PADULA MODEL

    13

    DEFINING SECURITY LEVELS USING CATEGORIES

    14

    THE BIBA MODEL

    15

    THE BIBA MODEL RULES

    I(u) < I(x).

    I(x) < I(u).

    16

    THE LOW-WATERMARK MODEL

    17

    THE CLARK-WILSON MODEL

    18

    THE CHINESE WALL MODEL

    19

    ROLE-BASED ACCESS CONTROL

    U.S. Navy image in the public domain.

    20

    RBAC COMPONENTS

    21

    HIERARCHICAL RBAC

    R1 > R2,

    if R1 includes all permissions of R2 and R2 includes all users of R1.

    22

    VISUALIZING ROLE HIERARCHY