Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control...

41
Security and Trust By Troy Lee

Transcript of Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control...

Page 1: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Security and TrustBy Troy Lee

Page 2: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Overview• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control

• Distributed Security• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 3: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Computer Security• “The protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).” – National Institute of Standards and Technology

Page 4: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

3 Main Aspects• Confidentiality (aka Secrecy)• Integrity• Availability

Page 5: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Confidentiality• Preventing unauthorized parties from accessing the

information or perhaps even being aware of the existence of the information

Page 6: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Cryptography• Equations• Cipher = Encryption Function(Encryption_Key, ClearText)• ClearText = Decryption Function(Decryption_Key, Cipher)

• 2 Forms• Shared-Key Cryptography• Public-Key Cryptography

• Best Practices• Evaluate Performance, Architecture, and Security Requirements• Choose a Suitable Public Algorithm• Use Frequently Changing Keys as the Primary Secrecy Mechanism

Page 7: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Integrity• Only authorized parties can manipulate the information and

do so only in authorized ways

Page 8: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Availability• Accessible by authorized parties on all appropriate occasions

Page 9: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Design Principles• Least Privilege• Fail-Safe Defaults• Economy of Mechanism• Complete Mediation• Open Design• Separation of Privilege• Least Common Mechanism• Psychological Acceptability• Defense in Depth

Page 10: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Defense in Depth

Page 11: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Architectural Access Control• Access Control Models• Connector-Centric Architectural Access Control

Page 12: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Access Control Models• Classic Discretionary Access Control• Role-Based Access Control• Mandatory Access Control

Page 13: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Connector-Centric Architectural Access Control• Basic Concepts• Central Role of Architectural Connectors• Algorithm to Check Architectural Access Control• Integrating Security in ASTER

Page 14: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Basic Concepts• Subject• Principal• Resource• Permission• Privilege• Safeguard

Page 15: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Central Role of Architectural Connectors• Components• Connectors• Secure Architecture Description Language

Page 16: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Secure xADL

Page 17: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Algorithm to Check Architectural Access Control

Page 18: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Secure Cooperation

Page 19: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Firefox

Page 20: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Integrating Security in ASTER

Page 21: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Distributed Security

Page 22: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Protection Against Piracy• Goals• Raise Cost of Breaking Protection Mechanism• Increase Probability of Being Caught• Discourage Attempts at Piracy

• Technologies• Hardware and Software Tokens• Water Marking• Code Partitioning

Page 23: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 24: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Trust• “A particular level of the subjective probability with which an

agent assesses that another agent or group of agents will perform a particular action, both before he can monitor such action (or independently of his capacity ever to be able to monitor it) and in a context in which it affects his own action” – Diego Gambetta

Page 25: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Trust Model• Describes the trust information that is used to establish trust

relationships, how that trust information is obtained, how that trust information is combined to determine trustworthiness, and how that trust information is modified in response to personal and reported experiences

Page 26: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Reputation-Based Systems• Types• Decentralized• Centralized

• Examples• Ebay• XREP

Page 27: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

XREP• Phase 1 – Resource Searching• Phase 2 – Resource Selection and Vote Polling• Phase 3 – Vote Evaluation• Phase 4 – Best Servent Check• Phase 5 – Resource Downloading

Page 28: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Phase 1

Page 29: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Phase 2

Page 30: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Phase 3

Page 31: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Phase 4

Page 32: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Phase 5

Page 33: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Architectural Approach to Decentralized Trust Management• Threats• Measures to Address Threats• Guidelines to Incorporate into an Architectural Style• Resultant Architectural Style• PACE Architectural Style• PACE-Based Trust-Enabled Decentralized File-Sharing App

Page 34: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Threats• Impersonation• Fraudulent Actions• Misrepresentation• Collusion• Denial of Service• Addition of Unknowns• Deciding Whom to Trust• Out-of-Band Knowledge

Page 35: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Measures to Address Threats• Use of Authentication• Separation of Internal Beliefs and Externally Reported

Information• Making Trust Relationships Explicit• Comparable Trust

Page 36: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Guidelines to Incorporate into an Architectural Style• Digital Identities• Separation of Internal and External Data• Making Trust Visible• Expression of Trust

Page 37: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Resultant Architectural Style• Functional Units• Communication• Information• Trust• Application

Page 38: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

PACE Architectural Style

Page 39: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

PACE-Based Trust-Enabled Decentralized File-Sharing App

Page 40: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

Summary• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control

• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 41: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural.

References• Bidan, C., and V. Issarny. Security Benefits from Software Architecture.

Web. 7 Apr. 2012. <http://www.springerlink.com/content/87378446049q1783/fulltext.pdf>.

• Devanbu, Premkumar T., and Stuart Stubblebine. Software Engineering for Security: A Roadmap. 2000. Web. 7 Apr. 2012. <http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.1303>.

• Nagaratnam, Nataraj, Philippe Janson, John Dayka, Anthony Nadalin, Frank Siebenlist, Von Welch, Ian Foster, and Steve Tuecke. The Security Architecture for Open Grid Services. 17 July 2002. Web. 7 Apr. 2012. <ftp://ftp.cigs.unimo.it/pub/OGSA-SecArch-v1-07192002.pdf>.

• Taylor, Richard N., Nenad Medvidovic, and Eric M. Dashofy. Software Architecture: Foundations, Theory, and Practice. Hoboken, NJ: Wiley, 2010. Print.