SlideShare a Scribd company logo
JTAM: A Joint Threshold Administration ModelJTAM: A Joint Threshold Administration Model
Ashish Kamra, Elisa Bertino
akamra@purdue.edu, bertino@cs.purdue.edu
OBJECTIVE: To support separation-of-duty in performing certain critical and sensitive
operations (at production sites) called JTAM-ops such as user creation/deletion/modification,
grant/revoke of permissions, modification of security policies, and so forth.
KEY IDEA: A JTAM-op is not executed by the system unless it has been authorized by at least k - 1
additional administrators where k must be specified when creating the JTAM-op.
HIGHLIGHTS: 1. Create a digital signature on the hash of the in-progress JTAM-op details.
2. The JTAM-op is executed by the system only when a valid digital signature can be created on the
JTAM-op details.
3. Uses Victor Shoup’s threshold cryptography signature scheme to create the digital signature.
4. Every administrator is assigned a secret share for signing a JTAM-op.
Lifecycle of a JTAM-op (Create user command for example)Lifecycle of a JTAM-op (Create user command for example)
LIFECYCLE DETAILS: 1. The system generates a signature share on the hash of the command
definition using command creator’s secret share.
2. It then generates a signature share for each of the administrators that authorizes the command.
3. When k - 1 administrators have authorized the command, the signature combining and verification
algorithms are executed.
4. The final signature on the command is verified using the public key corresponding to the k value
associated with the command.
5. The final signature is stored along with the newly created user entry.
6. A signature verification deamon periodically verifies the signature on all the user entries.
7. Any user attribute modified without using a JTAM-op will invalidate the signature on the user entry.
The signature violation is detected by the signature verification daemon.

More Related Content

Viewers also liked

hermeneutica analogica
hermeneutica analogicahermeneutica analogica
hermeneutica analogica
Ivan Felix
 
25 funciones del espíritu santo
25 funciones del espíritu santo25 funciones del espíritu santo
25 funciones del espíritu santo
Andres Mora Monge
 
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاحالتعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
DR Hend Al Muftah
 
Mark Stonerock 2-23-16
Mark Stonerock 2-23-16Mark Stonerock 2-23-16
Mark Stonerock 2-23-16
Mark Stonerock
 
Evolucion de la tecnologia
Evolucion de la tecnologiaEvolucion de la tecnologia
Evolucion de la tecnologia
Tatiana Paz
 
Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016
Ramzy Sweis
 

Viewers also liked (6)

hermeneutica analogica
hermeneutica analogicahermeneutica analogica
hermeneutica analogica
 
25 funciones del espíritu santo
25 funciones del espíritu santo25 funciones del espíritu santo
25 funciones del espíritu santo
 
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاحالتعليم وسوق العمل في قطر ألام وأمال هند المفتاح
التعليم وسوق العمل في قطر ألام وأمال هند المفتاح
 
Mark Stonerock 2-23-16
Mark Stonerock 2-23-16Mark Stonerock 2-23-16
Mark Stonerock 2-23-16
 
Evolucion de la tecnologia
Evolucion de la tecnologiaEvolucion de la tecnologia
Evolucion de la tecnologia
 
Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016Chicago Suburbs Newspaper V-Day 2016
Chicago Suburbs Newspaper V-Day 2016
 

Similar to JTAM Poster

Mimikatz
MimikatzMimikatz
Mimikatz
rishabh sharma
 
ObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recordingObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recording
ObserveIT
 
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
Luis Benitez
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
Vishal Kumar
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
Atul Vaish
 
Crypto box - crypto casino
Crypto box - crypto casinoCrypto box - crypto casino
Crypto box - crypto casino
MaksymVasylchykov
 
Why SureLog?
Why SureLog?Why SureLog?
Why SureLog?
Ertugrul Akbas
 
Polling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayPolling system solution using blockchain & Liferay
Polling system solution using blockchain & Liferay
Dhanraj Dadhich
 
State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...
Market Engel SAS
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
Sajid Marwat
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post Exploitation
PRISMA CSI
 
Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017
Dejan Glozic
 
Post Exploitation Using Meterpreter
Post Exploitation Using MeterpreterPost Exploitation Using Meterpreter
Post Exploitation Using Meterpreter
Shubham Mittal
 
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
Asst.prof M.Gokilavani
 
Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
Société Tripalio
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
Olav Tvedt
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
Shivashish Kumar
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisors
Priyanka Aash
 
DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga
 

Similar to JTAM Poster (20)

Mimikatz
MimikatzMimikatz
Mimikatz
 
ObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recordingObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recording
 
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
 
Crypto box - crypto casino
Crypto box - crypto casinoCrypto box - crypto casino
Crypto box - crypto casino
 
Why SureLog?
Why SureLog?Why SureLog?
Why SureLog?
 
Polling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayPolling system solution using blockchain & Liferay
Polling system solution using blockchain & Liferay
 
State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...State of Nevada gaming control board minimal internal control standards_mics_...
State of Nevada gaming control board minimal internal control standards_mics_...
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post Exploitation
 
Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017Authentication in microservice systems - fsto 2017
Authentication in microservice systems - fsto 2017
 
Post Exploitation Using Meterpreter
Post Exploitation Using MeterpreterPost Exploitation Using Meterpreter
Post Exploitation Using Meterpreter
 
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...CS304PC:Computer Organization and Architecture  Session 7 Microprogrammed con...
CS304PC:Computer Organization and Architecture Session 7 Microprogrammed con...
 
Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Control Memory.pptx
 
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Breaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisorsBreaking hardware enforced security with hypervisors
Breaking hardware enforced security with hypervisors
 
DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!DevOps Braga #3: Admin rights, everyone gets Admin rights!
DevOps Braga #3: Admin rights, everyone gets Admin rights!
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

JTAM Poster

  • 1. JTAM: A Joint Threshold Administration ModelJTAM: A Joint Threshold Administration Model Ashish Kamra, Elisa Bertino akamra@purdue.edu, bertino@cs.purdue.edu OBJECTIVE: To support separation-of-duty in performing certain critical and sensitive operations (at production sites) called JTAM-ops such as user creation/deletion/modification, grant/revoke of permissions, modification of security policies, and so forth. KEY IDEA: A JTAM-op is not executed by the system unless it has been authorized by at least k - 1 additional administrators where k must be specified when creating the JTAM-op. HIGHLIGHTS: 1. Create a digital signature on the hash of the in-progress JTAM-op details. 2. The JTAM-op is executed by the system only when a valid digital signature can be created on the JTAM-op details. 3. Uses Victor Shoup’s threshold cryptography signature scheme to create the digital signature. 4. Every administrator is assigned a secret share for signing a JTAM-op. Lifecycle of a JTAM-op (Create user command for example)Lifecycle of a JTAM-op (Create user command for example) LIFECYCLE DETAILS: 1. The system generates a signature share on the hash of the command definition using command creator’s secret share. 2. It then generates a signature share for each of the administrators that authorizes the command. 3. When k - 1 administrators have authorized the command, the signature combining and verification algorithms are executed. 4. The final signature on the command is verified using the public key corresponding to the k value associated with the command. 5. The final signature is stored along with the newly created user entry. 6. A signature verification deamon periodically verifies the signature on all the user entries. 7. Any user attribute modified without using a JTAM-op will invalidate the signature on the user entry. The signature violation is detected by the signature verification daemon.