Security and Trust
-
Upload
ethan-bernard -
Category
Documents
-
view
46 -
download
0
description
Transcript of Security and Trust
![Page 1: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/1.jpg)
Security and TrustBy Troy Lee
![Page 2: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/2.jpg)
Overview• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control
• Distributed Security• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management
![Page 3: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/3.jpg)
Computer Security• “The protection afforded to an automated information
system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).” – National Institute of Standards and Technology
![Page 4: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/4.jpg)
3 Main Aspects• Confidentiality (aka Secrecy)• Integrity• Availability
![Page 5: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/5.jpg)
Confidentiality• Preventing unauthorized parties from accessing the
information or perhaps even being aware of the existence of the information
![Page 6: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/6.jpg)
Cryptography• Equations• Cipher = Encryption Function(Encryption_Key, ClearText)• ClearText = Decryption Function(Decryption_Key, Cipher)
• 2 Forms• Shared-Key Cryptography• Public-Key Cryptography
• Best Practices• Evaluate Performance, Architecture, and Security Requirements• Choose a Suitable Public Algorithm• Use Frequently Changing Keys as the Primary Secrecy Mechanism
![Page 7: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/7.jpg)
Integrity• Only authorized parties can manipulate the information and
do so only in authorized ways
![Page 8: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/8.jpg)
Availability• Accessible by authorized parties on all appropriate occasions
![Page 9: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/9.jpg)
Design Principles• Least Privilege• Fail-Safe Defaults• Economy of Mechanism• Complete Mediation• Open Design• Separation of Privilege• Least Common Mechanism• Psychological Acceptability• Defense in Depth
![Page 10: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/10.jpg)
Defense in Depth
![Page 11: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/11.jpg)
Architectural Access Control• Access Control Models• Connector-Centric Architectural Access Control
![Page 12: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/12.jpg)
Access Control Models• Classic Discretionary Access Control• Role-Based Access Control• Mandatory Access Control
![Page 13: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/13.jpg)
Connector-Centric Architectural Access Control• Basic Concepts• Central Role of Architectural Connectors• Algorithm to Check Architectural Access Control• Integrating Security in ASTER
![Page 14: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/14.jpg)
Basic Concepts• Subject• Principal• Resource• Permission• Privilege• Safeguard
![Page 15: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/15.jpg)
Central Role of Architectural Connectors• Components• Connectors• Secure Architecture Description Language
![Page 16: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/16.jpg)
Secure xADL
![Page 17: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/17.jpg)
Algorithm to Check Architectural Access Control
![Page 18: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/18.jpg)
Secure Cooperation
![Page 19: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/19.jpg)
Firefox
![Page 20: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/20.jpg)
Integrating Security in ASTER
![Page 21: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/21.jpg)
Distributed Security
![Page 22: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/22.jpg)
Protection Against Piracy• Goals• Raise Cost of Breaking Protection Mechanism• Increase Probability of Being Caught• Discourage Attempts at Piracy
• Technologies• Hardware and Software Tokens• Water Marking• Code Partitioning
![Page 23: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/23.jpg)
Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management
![Page 24: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/24.jpg)
Trust• “A particular level of the subjective probability with which an
agent assesses that another agent or group of agents will perform a particular action, both before he can monitor such action (or independently of his capacity ever to be able to monitor it) and in a context in which it affects his own action” – Diego Gambetta
![Page 25: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/25.jpg)
Trust Model• Describes the trust information that is used to establish trust
relationships, how that trust information is obtained, how that trust information is combined to determine trustworthiness, and how that trust information is modified in response to personal and reported experiences
![Page 26: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/26.jpg)
Reputation-Based Systems• Types• Decentralized• Centralized
• Examples• Ebay• XREP
![Page 27: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/27.jpg)
XREP• Phase 1 – Resource Searching• Phase 2 – Resource Selection and Vote Polling• Phase 3 – Vote Evaluation• Phase 4 – Best Servent Check• Phase 5 – Resource Downloading
![Page 28: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/28.jpg)
Phase 1
![Page 29: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/29.jpg)
Phase 2
![Page 30: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/30.jpg)
Phase 3
![Page 31: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/31.jpg)
Phase 4
![Page 32: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/32.jpg)
Phase 5
![Page 33: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/33.jpg)
Architectural Approach to Decentralized Trust Management• Threats• Measures to Address Threats• Guidelines to Incorporate into an Architectural Style• Resultant Architectural Style• PACE Architectural Style• PACE-Based Trust-Enabled Decentralized File-Sharing App
![Page 34: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/34.jpg)
Threats• Impersonation• Fraudulent Actions• Misrepresentation• Collusion• Denial of Service• Addition of Unknowns• Deciding Whom to Trust• Out-of-Band Knowledge
![Page 35: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/35.jpg)
Measures to Address Threats• Use of Authentication• Separation of Internal Beliefs and Externally Reported
Information• Making Trust Relationships Explicit• Comparable Trust
![Page 36: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/36.jpg)
Guidelines to Incorporate into an Architectural Style• Digital Identities• Separation of Internal and External Data• Making Trust Visible• Expression of Trust
![Page 37: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/37.jpg)
Resultant Architectural Style• Functional Units• Communication• Information• Trust• Application
![Page 38: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/38.jpg)
PACE Architectural Style
![Page 39: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/39.jpg)
PACE-Based Trust-Enabled Decentralized File-Sharing App
![Page 40: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/40.jpg)
Summary• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control
• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management
![Page 41: Security and Trust](https://reader030.fdocuments.in/reader030/viewer/2022033103/568132ef550346895d99a945/html5/thumbnails/41.jpg)
References• Bidan, C., and V. Issarny. Security Benefits from Software Architecture.
Web. 7 Apr. 2012. <http://www.springerlink.com/content/87378446049q1783/fulltext.pdf>.
• Devanbu, Premkumar T., and Stuart Stubblebine. Software Engineering for Security: A Roadmap. 2000. Web. 7 Apr. 2012. <http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.1303>.
• Nagaratnam, Nataraj, Philippe Janson, John Dayka, Anthony Nadalin, Frank Siebenlist, Von Welch, Ian Foster, and Steve Tuecke. The Security Architecture for Open Grid Services. 17 July 2002. Web. 7 Apr. 2012. <ftp://ftp.cigs.unimo.it/pub/OGSA-SecArch-v1-07192002.pdf>.
• Taylor, Richard N., Nenad Medvidovic, and Eric M. Dashofy. Software Architecture: Foundations, Theory, and Practice. Hoboken, NJ: Wiley, 2010. Print.