Computer Security- Lecture 9- Access Control
Computer Security- Lecture 9- Access Control
What is access control?
Defining, managing and enforcing rights and permissions
Authorisation- who is allowed to do what
Authentication- who is what
Reference monitors
Concept in operating systems, refers to machine mediating access to resources
Example: a firewall
Example-
File 1- can be read and written by Bob
But only read by Phil
(o,℘((s,℘(p))))
Means set object ((set subject (permissions))))
Capabilities
Is a pair
List is the list of pairs for any subject
e.g. BOB having access to file 3 and file 1- can read file 2 but write and read file 3
(s,℘((o,℘(p))))
Access control Matrix
The ACL’s and capability lists are specific models of these matrixes
So can see Alice has access to read /etc/password
Discretionary Access control (DAC)
Model where the access control on objects is up to owner
Chmod command in unix- can choose is rights for users, groups and others
HRU model
Model- needs own reading
Unfortunately, these models are vulnerable to trojan horses!
Mandatory Access Control
Military style
Users cannot change policies
Multi-Level Security (MLS)
Works on partial ordering, L1 <L2 would mean L1 is less sensitive
Can use this to create a lattice
Policies within this
Bell and La Papudula
Biba
BLP
Enforces secrecy of information based on MLS
Example- subject can have read access to object if the object if the classification of the object is less or equal tothan the classification of the subject
Or if the classification of the subject is less than that if the object, it cannot be written to
Biba
Integrity rather than confidentiality
“A subject, S, can have a write access to an object, O, only if C(O)≤ C(S)”
Integrity- no read down example
“If a subject, S, can read an object, O, then S can have the write access only to objects, P, where C(P) ≤ C(O)”
Comments
Post a Comment