© 2005 Ravi Sandhu Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory...

16
© 2005 Ravi Sandhu www.list.gmu.edu Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

Transcript of © 2005 Ravi Sandhu Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory...

Page 1: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason [email protected]

Page 2: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

• Jason Crampton and George Loizou. “Administrative scope: A foundation for role-based administrative models.” ACM Transactions on Information and System Security, Volume 6, Number 2, May 2003, pages 201-231.

• Several diagrams and text excerpts are taken directly from this paper.

Page 3: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

Page 4: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Example Hierarchies

Page 5: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

5

© 2005 Ravi Sandhuwww.list.gmu.edu

NotationImmediate children Immediate parents Minimal roles

Maximal roles

Junior roles Senior roles

Page 6: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Four Operations

Page 7: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Semantics of Edge Operations

Page 8: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Edge Insertion Anomaly

YNN

NNY

AddEdge(DSO,PE1,QE1) Y

Page 9: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scope

Page 10: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Evolving Administrative Scope

Dynamic administrative scopeVersusStatic can-modify

Page 11: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative Scoper is an immediate child of r’

Page 12: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

12

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA Conditions for Four Operations

• These conditions always apply• RHA1

• Additional conditions may be imposed• RHA2, RHA3, RHA4

Page 13: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

13

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA1

• Regular roles are also administrative roles

• A role administers roles in its administrative scope

• No further conditions

• Too permissive• ED administers E

Page 14: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

14

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA2

• RHA1 plus

• Only roles explicitly designated as administrators can administer• Say DIR, PL1, PL2 but not ED and the others

Page 15: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

15

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3

Page 16: © 2005 Ravi Sandhu  Administrative Scope (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George.

16

© 2005 Ravi Sandhuwww.list.gmu.edu

RHA3