SlideShare a Scribd company logo
UT DALLAS
UT DALLAS Erik Jonsson School of Engineering & Computer Science
FEARLESS engineering
Access Control
Basics
Murat Kantarcioglu
FEARLESS engineering
Access Control - basic concepts
• An access control system regulates the operations
that can be executed on data and resources to be
protected
• Its goal is to control operations executed by subjects
in order to prevent actions that could damage data
and resources
• Access control is typically provided as part of the
operating system and of the database management
system (DBMS)
FEARLESS engineering
Access Control - basic concepts
Subject Access
request
Reference
monitor
Object
• The very nature of access control suggests that there is an active
subject requiring access to a passive object to perform some
specific access operation.
• A reference monitor grants or denies access
• This fundamental and simple notion of access control is due to
Lampson
------------------
B. Lampson. Protection. ACM Operating System Reviews, 8, 1974.
FEARLESS engineering
Access Control Mechanism
• It is typically a software system implementing the
access control function
• It is usually part of other systems
• The access control mechanism uses some access
control policies to decide whether to grant or deny a
subject access to a requested resource
• We will refer to an access control system as system
comprising an access control mechanism and all
information required to take access control decisions
(for example, access permissions)
FEARLESS engineering
Object
• Anything that holds data, such as relations, directories,
interprocess messages, network packets, I/O devices, or
physical media
• We often refer to objects, controlled by the access
control system, as protection objects
• Note that not all resources managed by a system
need to be protected
FEARLESS engineering
Subject
• An abstraction of any active entity that performs
computation in the system
• Subjects can be classified into:
– users -- single individuals connecting to the system
– groups -- sets of users
– roles -- named collections of privileges / functional entities
within the organization
– processes -- executing programs on behalf of users
• Relations may exist among the various types of
subject
FEARLESS engineering
Access Operations - Access Modes
• Operations that a subject can exercise on the protected objects in
the system
• Each type of operation corresponds to an access mode
• The basic idea is that several different types of operation may be
executed on a given type of object; the access control system
must be able to control the specific type of operation
• The most simple example of access modes is:
– read look at the contents of an object
– write change the contents of an object
• In reality, there is a large variety of access modes
• The access modes supported by an access control mechanism
depend on the resources to be protected (read, write, execute,
select, insert, update, delete, …)
• Often an access control system uses modes with the same name
for different types of object; the same mode can correspond to
different operations when applied to different objects
FEARLESS engineering
Access Operations - Access Modes
An example
• Unix operating system
– Access modes defined for files
• read: reading from a file
• write: writing to a file
• execute: executing a (program) file
– Access models defined for directories
• read: list a directory contents
• write: create or rename a file in a directory
• execute: search a directory
FEARLESS engineering
Access Operations
Access Permissions and Attributes
• How does the reference monitor decides whether to
give access or not?
• Main approaches:
– It uses access permissions
• Typical of discretionary access control (DAC) models
– It uses information (often referred to as attributes) concerning
subjects and objects
• Typical of multilevel access control (MAC) models
• More innovative approaches have been developed
where access permissions can be also expressed in
terms of object and subject attributes and even context
parameters
FEARLESS engineering
Access Operations
Access Permissions
Subject Access
request
Reference
monitor
Object
Access
Permissions
Access Control
Policies
FEARLESS engineering
Access Permissions
• Access permissions, also called authorizations, are expressed in
terms of subjects, objects, and access modes
• From a conceptual point of view an access permission is a tuple <s,
o, a> where
– s is a subject
– o is an object
– a is an access mode
It states that subject s has the permission to execute operation a on
object o
We also say that s has access right a on object o
• Example: the access permission <Bob, Read, F1> states that Bob
has the permission to read file F1
FEARLESS engineering
Access Permissions
• Subjects, objects, and access modes can be organized into
hierarchies
• The semantics of the hierarchy depends on the domain
• The use of hierarchies has two important advantages:
– It reduces the number of permissions that need to be entered into
the access control system, thus reducing administration costs
– Combined with negative authorizations (to be discussed later on), it
supports the specification of exceptions
FEARLESS engineering
Object Hierarchy
object
component object
PART-OF
directory
file
FEARLESS engineering
Role Hierarchy
senior role
junior role
technical manager
programmer
FEARLESS engineering
Group Hierarchy
group
group member
GROUP MEMBERSHIP
University
CS Dept
Suppose that the group CS department has 200 members and the University group
5000 members; suppose we have the policy that the department calendar can be
read to all members of the University and written only by the members of CS;
these policies can be encoded into two access permissions of the form:
<University, calendar, Read> <CS Dept, calendar, Write>
FEARLESS engineering
Access Mode Hierarchy
mode
implied mode
SUBSUMPTION
write
read
FEARLESS engineering
Groups and Negative Permissions
• Groups can be seen as an intermediate level between
users and objects
• An example of an ideal world where all access
permissions are mediated by groups
g1 g2
s1 s2 s3 s4 s5 Users
Groups
Objects
o1 o2 o3 o4 o5 o6
FEARLESS engineering
Groups and Negative Permissions
• Often access control policies have special cases where is
proves convenient to give some user a permission for an
object directly or deny a user a permission that it would
normally derive from its membership in some group
• A negative permission specifies an operation that a
subject is not allowed to perform
• Representing negative permissions requires extending our
simple tuple model with an additional component:
<s, o, a, sign> where sign Î{+, -}
FEARLESS engineering
Groups and Negative Permissions
An example in which not all access permissions are
mediated through groups
Users
Groups
Objects
g1
s1 s2 s3
o1 o2 o3 o4 o5
FEARLESS engineering
Ownership and Administration
• A key question when dealing with access
control is who specifies which subjects can
access which objects for which operations
• In the case of permissions, this means
specifying which are the subjects that can
enter permissions
FEARLESS engineering
Ownership and Administration
Two basic options
• Discretionary approach
– the owner of a resource decrees who is allowed to have
access
– But then: who is the owner of a resource?
• Mandatory approach
– a system-wide policy decrees who is allowed to have access
FEARLESS engineering
Access Control Structures
The most well known access control structures for DAC
models are based on the notion of Access Control Matrix.
Let:
- S be a set of subjects
- O be a set of objects
- A be a set of access modes
An access control matrix M on S, O, and A is defined as
M = (Mso)s ∊ S, o ∊ O with Mso ⊂ A
The entry Mso specifies the set of access operations subject
s can perform on object o.
FEARLESS engineering
Access Control Structures
Example
{execute, read,
write}
-
{read, write}
Bill
{execute, read}
{execute}
-
Alice
fun.dir
edit.exe
bill.doc
FEARLESS engineering
Access Control Structures
Access Control Lists and Capabilities
• Directly implementing access control
matrices is quite inefficient, because in
most cases these matrices are sparse
• Therefore two main implementations have
been developed
– Access control lists
• Used in DBMS and Operating Systems
– Capabilities
FEARLESS engineering
Basic Operations in Access Control
• Grant permissions
– Inserting values in the matrix’s entries
• Revoke permissions
– Remove values from the matrix’s entries
• Check permissions
– Verifying whether the entry related to a subject s
and an object o contains a given access mode

More Related Content

Similar to access-control-basics-murat-kantarcioglu.pdf

Similar to access-control-basics-murat-kantarcioglu.pdf (20)

Topic 7 access control
Topic 7 access controlTopic 7 access control
Topic 7 access control
 
SE Linux
SE LinuxSE Linux
SE Linux
 
Protection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemProtection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating System
 
S5-Authorization
S5-AuthorizationS5-Authorization
S5-Authorization
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
Lucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_finalLucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_final
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
 
Top school in noida
Top school in noidaTop school in noida
Top school in noida
 
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptxDataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Oerating system project
Oerating system projectOerating system project
Oerating system project
 
L-3.1.1 (1).pptx
L-3.1.1 (1).pptxL-3.1.1 (1).pptx
L-3.1.1 (1).pptx
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Unix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access ControlUnix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access Control
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 

access-control-basics-murat-kantarcioglu.pdf

  • 1. UT DALLAS UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Access Control Basics Murat Kantarcioglu
  • 2. FEARLESS engineering Access Control - basic concepts • An access control system regulates the operations that can be executed on data and resources to be protected • Its goal is to control operations executed by subjects in order to prevent actions that could damage data and resources • Access control is typically provided as part of the operating system and of the database management system (DBMS)
  • 3. FEARLESS engineering Access Control - basic concepts Subject Access request Reference monitor Object • The very nature of access control suggests that there is an active subject requiring access to a passive object to perform some specific access operation. • A reference monitor grants or denies access • This fundamental and simple notion of access control is due to Lampson ------------------ B. Lampson. Protection. ACM Operating System Reviews, 8, 1974.
  • 4. FEARLESS engineering Access Control Mechanism • It is typically a software system implementing the access control function • It is usually part of other systems • The access control mechanism uses some access control policies to decide whether to grant or deny a subject access to a requested resource • We will refer to an access control system as system comprising an access control mechanism and all information required to take access control decisions (for example, access permissions)
  • 5. FEARLESS engineering Object • Anything that holds data, such as relations, directories, interprocess messages, network packets, I/O devices, or physical media • We often refer to objects, controlled by the access control system, as protection objects • Note that not all resources managed by a system need to be protected
  • 6. FEARLESS engineering Subject • An abstraction of any active entity that performs computation in the system • Subjects can be classified into: – users -- single individuals connecting to the system – groups -- sets of users – roles -- named collections of privileges / functional entities within the organization – processes -- executing programs on behalf of users • Relations may exist among the various types of subject
  • 7. FEARLESS engineering Access Operations - Access Modes • Operations that a subject can exercise on the protected objects in the system • Each type of operation corresponds to an access mode • The basic idea is that several different types of operation may be executed on a given type of object; the access control system must be able to control the specific type of operation • The most simple example of access modes is: – read look at the contents of an object – write change the contents of an object • In reality, there is a large variety of access modes • The access modes supported by an access control mechanism depend on the resources to be protected (read, write, execute, select, insert, update, delete, …) • Often an access control system uses modes with the same name for different types of object; the same mode can correspond to different operations when applied to different objects
  • 8. FEARLESS engineering Access Operations - Access Modes An example • Unix operating system – Access modes defined for files • read: reading from a file • write: writing to a file • execute: executing a (program) file – Access models defined for directories • read: list a directory contents • write: create or rename a file in a directory • execute: search a directory
  • 9. FEARLESS engineering Access Operations Access Permissions and Attributes • How does the reference monitor decides whether to give access or not? • Main approaches: – It uses access permissions • Typical of discretionary access control (DAC) models – It uses information (often referred to as attributes) concerning subjects and objects • Typical of multilevel access control (MAC) models • More innovative approaches have been developed where access permissions can be also expressed in terms of object and subject attributes and even context parameters
  • 10. FEARLESS engineering Access Operations Access Permissions Subject Access request Reference monitor Object Access Permissions Access Control Policies
  • 11. FEARLESS engineering Access Permissions • Access permissions, also called authorizations, are expressed in terms of subjects, objects, and access modes • From a conceptual point of view an access permission is a tuple <s, o, a> where – s is a subject – o is an object – a is an access mode It states that subject s has the permission to execute operation a on object o We also say that s has access right a on object o • Example: the access permission <Bob, Read, F1> states that Bob has the permission to read file F1
  • 12. FEARLESS engineering Access Permissions • Subjects, objects, and access modes can be organized into hierarchies • The semantics of the hierarchy depends on the domain • The use of hierarchies has two important advantages: – It reduces the number of permissions that need to be entered into the access control system, thus reducing administration costs – Combined with negative authorizations (to be discussed later on), it supports the specification of exceptions
  • 14. FEARLESS engineering Role Hierarchy senior role junior role technical manager programmer
  • 15. FEARLESS engineering Group Hierarchy group group member GROUP MEMBERSHIP University CS Dept Suppose that the group CS department has 200 members and the University group 5000 members; suppose we have the policy that the department calendar can be read to all members of the University and written only by the members of CS; these policies can be encoded into two access permissions of the form: <University, calendar, Read> <CS Dept, calendar, Write>
  • 16. FEARLESS engineering Access Mode Hierarchy mode implied mode SUBSUMPTION write read
  • 17. FEARLESS engineering Groups and Negative Permissions • Groups can be seen as an intermediate level between users and objects • An example of an ideal world where all access permissions are mediated by groups g1 g2 s1 s2 s3 s4 s5 Users Groups Objects o1 o2 o3 o4 o5 o6
  • 18. FEARLESS engineering Groups and Negative Permissions • Often access control policies have special cases where is proves convenient to give some user a permission for an object directly or deny a user a permission that it would normally derive from its membership in some group • A negative permission specifies an operation that a subject is not allowed to perform • Representing negative permissions requires extending our simple tuple model with an additional component: <s, o, a, sign> where sign Î{+, -}
  • 19. FEARLESS engineering Groups and Negative Permissions An example in which not all access permissions are mediated through groups Users Groups Objects g1 s1 s2 s3 o1 o2 o3 o4 o5
  • 20. FEARLESS engineering Ownership and Administration • A key question when dealing with access control is who specifies which subjects can access which objects for which operations • In the case of permissions, this means specifying which are the subjects that can enter permissions
  • 21. FEARLESS engineering Ownership and Administration Two basic options • Discretionary approach – the owner of a resource decrees who is allowed to have access – But then: who is the owner of a resource? • Mandatory approach – a system-wide policy decrees who is allowed to have access
  • 22. FEARLESS engineering Access Control Structures The most well known access control structures for DAC models are based on the notion of Access Control Matrix. Let: - S be a set of subjects - O be a set of objects - A be a set of access modes An access control matrix M on S, O, and A is defined as M = (Mso)s ∊ S, o ∊ O with Mso ⊂ A The entry Mso specifies the set of access operations subject s can perform on object o.
  • 23. FEARLESS engineering Access Control Structures Example {execute, read, write} - {read, write} Bill {execute, read} {execute} - Alice fun.dir edit.exe bill.doc
  • 24. FEARLESS engineering Access Control Structures Access Control Lists and Capabilities • Directly implementing access control matrices is quite inefficient, because in most cases these matrices are sparse • Therefore two main implementations have been developed – Access control lists • Used in DBMS and Operating Systems – Capabilities
  • 25. FEARLESS engineering Basic Operations in Access Control • Grant permissions – Inserting values in the matrix’s entries • Revoke permissions – Remove values from the matrix’s entries • Check permissions – Verifying whether the entry related to a subject s and an object o contains a given access mode