From: Simone Fischer-Hübner <Simone.Fischer-Huebner@kau.se>
Subject: Re: Rule Set Based Access Control (RSBAC)
Date: Mon, 09 Apr 2001 13:33:17 +0200
Next Article (by Subject): Run time problem: 00:05 device unknown Alessandro Iob
Previous Article (by Subject): Re: Rule Set Based Access Control (RSBAC) Amon Ott
Top of Thread: Re: Rule Set Based Access Control (RSBAC) Amon Ott
Articles sorted by: [Date]
[Author]
[Subject]
Hi, here is a quick reply before I leave for the weekend: At 11:03 2001-04-06 -0400, you wrote: >On Fri, 6 Apr 2001, Simone [iso-8859-1] Fischer-H=FCbner wrote: > > > I have followed some of the discussions over the lists. As one of the= main > > authors of the Privacy Model (PM), which is implemented in RSBAC, it was > > interesting to read that you think that PM can be easily expressed with= =20 > TE. > > However, I doubt that you can really express all necessary details and > > security properties. >In my recent response to Amon, I discussed n-person control and time >limits, and I raised the question of the right place for enforcing some >of the privacy model restrictions (application vs. OS). Naturally, >I'll be interested in your views on that as well. It may be appropriate to enforce the privacy policy at database level as=20 well. However, for a secure system implementation, the PM security policy=20 should also be enforced/supported at a lower system level and the=20 application should rely on the operating system to enforce the PM policy.=20 We decided that it is helpful to have a complete model implementation in=20 the operating system. >I'll try to >answer your additional questions below... > > > In particular, you have not discussed how the information flow property= =20 > can > > be expressed to prevent illegal information flow(see also example in our > > NISS=B498 paper: in a hospital, medical data accessible for medical=20 > treatment > > purposes could be illegally copied to admission data accessible for > > administration purposes, or another example: personal data could be= copied > > to data classified as non-personal) : > > In order to prevent illegal information flow , subject (processes) have= =20 > two > > further security attributes: Input-purposes and output-purposes. ><some text deleted> > > I do not see how this information flow control can be easily expressed= =20 > with > > RBAC/TE ? > >You've chosen a particular approach for preventing illegal information >flow in your model. But that isn't the only way to achieve the same >high-level security requirement. Rather than dynamically adjusting >the purpose attributes of the process as it performs reads and writes, >you can simply set the purpose attributes when the process is created >based on your intended task, and conservatively prohibit reads or writes >that would violate your information flow restrictions. The same >is true for Multi-Level Security restrictions. Well, this approach will be more restrictive. According to our approach,=20 the allowed read and write accesses for a process performing a certain task= =20 can vary depending on what data the process has read and what data it has=20 currently write-access to. A simple example: the process is allowed to=20 write to non-personal data (for which most of the security properties do=20 not apply) unless it had already read access to personal data (because then= =20 it could illegally write personal data to unprotected non-personal data). Thus, if you decide on read and write accesses before process execution,=20 you will be more restrictive than necessary. > > Well, this seems to be possible, but then you wont have any easy and > > transparent administration of access rights any longer (which should be= =20 > one > > of the advantage of Role Based Access Control -RBAC). > > Just imagine that you model in your system 10 different purposes. This > > means that you have to model with TE 1024 different types (for all=20 > possible > > subsets of purposes). > >It seems unlikely that all combinations of purposes are needed or >that a large number of purposes must be associated with any object >at any given point in time. Well, if you want to include relabeling in case that data subjects have=20 given their consents for a usage of their data for potentially any possible= =20 purpose sets, you have to define types for all possible subsets of=20 purposes, because all of them could be potentially needed (Example: Assume= =20 there is a personal data object with only one purpose. The data subject of= =20 this object could potentially give his/her consent that this object could=20 be used for any possible subset of the set of the remaining purposes). > > Besides, by relabeling the personal data to include another purpose to > > which the data subjects have agreed, you change the real semantic of the > > O-purposes attribute of data, which should only stand for the purposes= for > > which data for initially collected. Relabeling data in case of a consent > > would in this case also require that you have to change the type= (encoding > > purposes) in the list of necessary accesses as well. > >I suppose you could encode two purpose sets in each type to >represent both the original purposes and the current purposes. >But I'm not sure how critical these characteristics are to meeting >the high-level security requirements, as opposed to just being >aspects of your approach. Still, a change of the type in the list of necessary accesses would be=20 necessary. Best regards, Simone Fischer-Huebner. ----------------------------------------------------------------------- Prof. Dr. Simone Fischer-Huebner Karlstad University Department of Computer Science Universitetsgatan 1 S 651 88 Karlstad / Sweden Tel: +46 54 700 1723 Fax: +46 54 700 1828 http://www.cs.kau.se/~simone/ simone.fischer-huebner@kau.se - To unsubscribe from the rsbac list, send a mail to majordomo@rsbac.org with unsubscribe rsbac as single line in the body.
Next Article (by Subject): Run time problem: 00:05 device unknown Alessandro Iob
Previous Article (by Subject): Re: Rule Set Based Access Control (RSBAC) Amon Ott
Top of Thread: Re: Rule Set Based Access Control (RSBAC) Amon Ott
Articles sorted by: [Date]
[Author]
[Subject]