1 / 11

World-Leading Research with Real-World Impact!

Institute for Cyber Security. RT-Based Administrative Models for Community Cyber Security Information Sharing. Ravi Sandhu, Khalid Zaman Bijon , Xin Jin, Ram Krishnan Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011

iona
Download Presentation

World-Leading Research with Real-World Impact!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Institute for Cyber Security RT-Based Administrative Models forCommunity Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011 International Workshop on Trusted Collaboration World-Leading Research with Real-World Impact! 1

  2. Community is well demarcated geographical boundary E.g. county or larger city Secure Information Sharing in Community Center for Infrastructure Assurance and Security (CIAS) communication, incident response, disaster recovery, etc Sandhu et al1 proposed an informal requirements for information sharing for cooperative cyber incident management in a community Community Cyber Security 2 1R. Sandhu, R. Krishnan, and G. White. Towards secure information sharing models for community cyber security. In Proc. 6th IEEE Int. Conf. on Collaborative Computing, 2010. World-Leading Research with Real-World Impact!

  3. Community Cyber Security Filtered RW Administered Membership Core Group Incident Group Administered Membership Automatic Membership Administered Membership Filtered RW Open Group Domain Experts World-Leading Research with Real-World Impact!

  4. 1Role Based Trust Management (RT) framework Strong mathematical foundation, explicit inclusions of roles, sizeable literature The basic constructs of RT0 Entities (A, B1, Alice, etc) Role names (r, r1, student, etc) Role (A.r, B1.r1, U1.student, etc) Four types of credentials (An Entity can issue) Simple Member: A.r ← D Simple Inclusion: A.r ← B.r Linking Inclusion: A.r ← A.r1.r2 Intersection Inclusion: A.r ← B1.r1∩B2.r2 Administrative Model 1N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a rolebased trust management framework. In Proc. of the IEEE Symposium on Security and Privacy, May 2002, 2010. World-Leading Research with Real-World Impact!

  5. Community Elements • Community Entities • CG (core group), OG (open group), IG (incident group) • CPS (San Antonio Energy Utility), SAWS (San Antonio Water System), SAPD (San Antonio Police Department) • SAT (Hypothetical Entity that represents the community), etc • Roles • CG.user (All core group users) • SAT.member (Members of San Antonio Community) • CPS.itmember (IT members of CPS), etc World-Leading Research with Real-World Impact!

  6. Membership Management (Core Group) CPS.cgrep <-Alice SAT.member <- CPS Alice CPS SAT SAWS.cgrep <- Carol CG.user <- SAT.member.cgrep SAT.member <- SAWS Carol SAWS “Core” Group SAT.member <- SAPD SAPD.cgrep <- Danl SAPD Dan World-Leading Research with Real-World Impact!

  7. Membership Management (Open Group) I want! OG.volunteer <-Eve CPS.itmember <-Eve SAT.member <- CPS Eve CPS I don’t! SAT SAWS.itmembere <- Bob SAT.member <- SAWS OG.user <- CG.user Bob ∩ SAWS I don’t! SAT.member <- SAPD SAPD.itmember <- Gray OG.user <- SAT.member.itmember ∩ OG.volunteer Gray SAPD “Open” Group World-Leading Research with Real-World Impact!

  8. Membership Management (Incident Group) CG.user ∩ Core Group IG.authorized ← Alice IG.user ← CG.user ∩ IG.authorized Alice OG.user IG.user ← OG.user ∩ IG.authorized ∩ IG.authorized ← Eve Open Group “Incident” Group IG.user ← SAT.domainexpert ∩ IG.authorized Eve SAT.domainexpert ∩ IG.authorized ← Hilda Domain Expert Hilda World-Leading Research with Real-World Impact!

  9. Single Document Releases to An Incident Group Using RT1 and RTΘ An incident group can request a particular document to core Parameterized Role CG.read(?o) can read single object ?o upon approval from core A CG.user can approve it if he is not an IG.user of that Incident group Delegation of Role Activation Using RTD Extended Features World-Leading Research with Real-World Impact!

  10. Community Cyber Security Filtered RW Incident Groups Administered Membership Core Group Administered Membership Administered Membership Filtered Read Automatic Membership Administered Membership Administered Membership Administered Membership write Domain Experts Open Group World-Leading Research with Real-World Impact!

  11. RT as an administrative model in this context Limitations of RT approach Entity-Owned only membership Reverse Credential Chains Unable to Support Administration from an External Entity Conclusion World-Leading Research with Real-World Impact!

More Related