SlideShare a Scribd company logo
1 of 1
Download to read offline
JTAM: A Joint Threshold Administration ModelJTAM: A Joint Threshold Administration Model
Ashish Kamra, Elisa Bertino
akamra@purdue.edu, bertino@cs.purdue.edu
OBJECTIVE: To support separation-of-duty in performing certain critical and sensitive
operations (at production sites) called JTAM-ops such as user creation/deletion/modification,
grant/revoke of permissions, modification of security policies, and so forth.
KEY IDEA: A JTAM-op is not executed by the system unless it has been authorized by at least k - 1
additional administrators where k must be specified when creating the JTAM-op.
HIGHLIGHTS: 1. Create a digital signature on the hash of the in-progress JTAM-op details.
2. The JTAM-op is executed by the system only when a valid digital signature can be created on the
JTAM-op details.
3. Uses Victor Shoup’s threshold cryptography signature scheme to create the digital signature.
4. Every administrator is assigned a secret share for signing a JTAM-op.
Lifecycle of a JTAM-op (Create user command for example)Lifecycle of a JTAM-op (Create user command for example)
LIFECYCLE DETAILS: 1. The system generates a signature share on the hash of the command
definition using command creator’s secret share.
2. It then generates a signature share for each of the administrators that authorizes the command.
3. When k - 1 administrators have authorized the command, the signature combining and verification
algorithms are executed.
4. The final signature on the command is verified using the public key corresponding to the k value
associated with the command.
5. The final signature is stored along with the newly created user entry.
6. A signature verification deamon periodically verifies the signature on all the user entries.
7. Any user attribute modified without using a JTAM-op will invalidate the signature on the user entry.
The signature violation is detected by the signature verification daemon.

More Related Content

Viewers also liked (6)

hermeneutica analogica
hermeneutica analogicahermeneutica analogica
hermeneutica analogica
 
25 funciones del espíritu santo
25 funciones del espíritu santo25 funciones del espíritu santo
25 funciones del espíritu santo
 
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاحالتعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
 
Mark Stonerock 2-23-16
Mark Stonerock 2-23-16Mark Stonerock 2-23-16
Mark Stonerock 2-23-16
 
Evolucion de la tecnologia
Evolucion de la tecnologiaEvolucion de la tecnologia
Evolucion de la tecnologia
 
Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016
 

Similar to JTAM Poster

Post Exploitation Using Meterpreter
Post Exploitation Using MeterpreterPost Exploitation Using Meterpreter
Post Exploitation Using Meterpreter
Shubham Mittal
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisors
Priyanka Aash
 

Similar to JTAM Poster (20)

Mimikatz
MimikatzMimikatz
Mimikatz
 
ObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recordingObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recording
 
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
 
Crypto box - crypto casino
Crypto box - crypto casinoCrypto box - crypto casino
Crypto box - crypto casino
 
Why SureLog?
Why SureLog?Why SureLog?
Why SureLog?
 
Polling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayPolling system solution using blockchain & Liferay
Polling system solution using blockchain & Liferay
 
State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post Exploitation
 
Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017
 
Post Exploitation Using Meterpreter
Post Exploitation Using MeterpreterPost Exploitation Using Meterpreter
Post Exploitation Using Meterpreter
 
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
 
Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Control Memory.pptx
 
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisors
 
DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

JTAM Poster

  • 1. JTAM: A Joint Threshold Administration ModelJTAM: A Joint Threshold Administration Model Ashish Kamra, Elisa Bertino akamra@purdue.edu, bertino@cs.purdue.edu OBJECTIVE: To support separation-of-duty in performing certain critical and sensitive operations (at production sites) called JTAM-ops such as user creation/deletion/modification, grant/revoke of permissions, modification of security policies, and so forth. KEY IDEA: A JTAM-op is not executed by the system unless it has been authorized by at least k - 1 additional administrators where k must be specified when creating the JTAM-op. HIGHLIGHTS: 1. Create a digital signature on the hash of the in-progress JTAM-op details. 2. The JTAM-op is executed by the system only when a valid digital signature can be created on the JTAM-op details. 3. Uses Victor Shoup’s threshold cryptography signature scheme to create the digital signature. 4. Every administrator is assigned a secret share for signing a JTAM-op. Lifecycle of a JTAM-op (Create user command for example)Lifecycle of a JTAM-op (Create user command for example) LIFECYCLE DETAILS: 1. The system generates a signature share on the hash of the command definition using command creator’s secret share. 2. It then generates a signature share for each of the administrators that authorizes the command. 3. When k - 1 administrators have authorized the command, the signature combining and verification algorithms are executed. 4. The final signature on the command is verified using the public key corresponding to the k value associated with the command. 5. The final signature is stored along with the newly created user entry. 6. A signature verification deamon periodically verifies the signature on all the user entries. 7. Any user attribute modified without using a JTAM-op will invalidate the signature on the user entry. The signature violation is detected by the signature verification daemon.