Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of...

18
Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for Access Control Policy Specification Philip Inglesant M Angela Sasse - University College London David Chadwick Lei Lei Shi - University of Kent, Canterbury, UK
  • date post

    22-Dec-2015
  • Category

    Documents

  • view

    214
  • download

    0

Transcript of Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of...

Page 1: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

Symposium On Usable Privacy and SecurityCarnegie Mellon University 25 July 2008

Expressions of ExpertnessThe Virtuous Circle of NaturalLanguage for Access Control Policy Specification

Philip Inglesant

M Angela Sasse - University College London

David Chadwick

Lei Lei Shi - University of Kent, Canterbury, UK

Page 2: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 2 of 14

What do we mean by “Expressions of Expertness”?

Need: Non-security specialists to express access control in formal terms

But struggle to express this in formal terms which the computer can interpret

• They are experts concerning their own resources: they know who should be given access to what to do which action

• Only the user knows what they “really want”

Grid computing – similar to cluster computing – linked computers working together

Systems can be distributed geographically

Across administrative domains

Page 3: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 3 of 14

Access control and authorization

• “Access control is the ability topermit or deny the use of a particular resourceby a particular entity” - Wikipedia

• AuthZ is more important than AuthN but has been studied less

• Authorization is inherently complex but, for usability, “complexity is the enemy of success” - Karat Brodie & Karat 2005

Page 4: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 4 of 14

The Context of this research: PERMISPERMIS is an integrated AuthZ infrastructure

Open source

Works with Grid, Apache Web servers, .Net, and others

• PERMIS makes access control decisions …

• … as defined by your access control policies

• … written in XML

Page 5: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 5 of 14

Role Based Access Control

RBAC permissions are always positive

Permissions to do actions on resources are assigned to roles, not users

Assignment of Roles to Users by Administrators in (remote) Domains

→ RBAC model presents conceptual difficulties

Policy specification

User assignment

Users Roles Permissions

Actions

Resources

Permission assignment

PERMIS allows you to delegate the ability to assign roles to Role/Attribute Administrators

Delegated assignment

RBAC permissions are always positive, although there can be constraints. Permissions not granted are implicitly denied – “Deny all, except …”

Page 6: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 6 of 14

Overcoming conceptual difficulties: existing approaches

• PERMIS Editor: GUI-based approach– Conceptual Design - metaphors to match users’ mental

models– Prominent warning: “this is DENY ALL, EXCEPT”

• Controlled natural language approaches– Fundamentally – reduce distance between user’s

intentions their expression– SPARCLE – for privacy and other policies– Virtuous Circle – input and output of AuthZ policies

Page 7: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 7 of 14

Our approach: Controlled natural language based on an ontology

Permissions, actions, resources, roles, & other entities, and relations between them

User’s world

Computer’s world

Requests and responses between user and computer

Controlled natural language may be more “natural” and less ambiguous than full natural language

X.509_PMI_RBAC_Policy OID=".091007.1"> ....

The user does not have to know about the computer’s world

Page 8: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 8 of 14

Carrying out our approach

• Phase 1: Interviews and focus groups– 45+ Resource owners in Grid computing– How do they think about their AuthZ requirements?– How do they express them?

• Phase 2: Design of ontology and controlled language processing– From findings of Phase 1– Keep it open but above all easy– Basic building blocks – users construct policies

according to their needs

Page 9: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 9 of 14

Example

Print is an action.Printers are a type of resource.Printer has print.HP Laserjet 1 is a printer.

Manager and staff are roles.Manager is superior to staff.Staff can print on HP Laserjet 1.Manager can print on all printers.

David and John are administrators.David can assign manager to all users.John can assign staff to users from DepartmentCS.

read is an action.write is an action.records are a type of resource.records has read and write.name, dobs, addresses, postcodes are a resource.

analyst and clerk are roles.analysts can read from dob and postcode.

Page 10: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 10 of 14

Evaluation: can users express their real world intentions?

• Lab-based observations: 17 target users• Neutral or application-specific scenarios• Recorded and analysed for time and number of

tries, classes of problem and comments

→ How usable is the basic interface? Are users daunted by the blank screen?

→ Can users understand the building blocks and use them to construct workable policies?

Page 11: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 11 of 14

Overall results• Not daunted by controlled natural language

interface• Time and tries are higher than we would like:

– mean 24:27 minutes in 4.47 tries

• Largely overcomes conceptual difficulties– No tendency to “deny” access to resources

But: • Problems with features of controlled natural

language

• Difficulties constructing from the “building blocks”

Page 12: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 12 of 14

The underlying mechanism makes itself felt

→ Underlying model does not match the users’ expectation

→ What do they need to know? How can we overcome the problems?

• Not quite natural language– Having to declare elements– Prepositions after verbs

• Using the building blocks– classes and instancesClerks, Owners and Analysts are roles.

Name, DoB, Address and Postcode are resources.

Clerks can write to Name, DoB, Address and Postcode.

Owners can read all fields.

Address is a type of resource.… instead ofField is a type of resource.Address is a field.

Printers are a type of resource.HP Laserjet 1 is a printer.from

Page 13: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 13 of 14

What do they need to know? How can they know it?• More informative timely feedback

– Line by line parsing– Don’t silently fix problems – only the user knows what

they “really want”– Drop-down boxes to disambiguate

• 2-way street between GUI and controlled language– An integrated interface

Page 14: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008 Page 14 of 14

Review and conclusions• Need: expression of formal AuthZ by non-experts• Question: Is controlled natural language is more

“natural” than GUI?• Design and evaluation of controlled language• Can users express access control needs?

– Overall: well understood and usable, but -– Underlying mechanisms make themselves felt

• Meeting the needs of the user in their own terms– Feedback– Integrated interface

Page 15: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008

[email protected]

http://www.cs.ucl.ac.uk/staff/P.Inglesant/

Human Centred Systems Group

Information Systems Security Group

http://www.cs.kent.ac.uk/research/groups/iss/

http://hornbeam.cs.ucl.ac.uk/hcs/

Page 16: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008

SPARCLE PERMIS

Privacy policies (although other types envisioned)

Authorization policies by resource owners

Protects data items in an organisation

Protects any collection of resources, actions and roles

Supports a generic privacy control

Supports PERMIS with delegation of authorities

Bespoke privacy model Role Based Access Control

Based on predefined User Categories, Actions, etc

Based on formal OWL ontology

Page 17: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008

NameDate of BirthAddressPostcode

Department A

Department B

Database

Analysts can see only DoB and Postcode

Clerks in Dept A can add and change date of birth, name, address and postcode

Process owners cannot change any data but can read it all

Users cannot see the whole of the Database; what they can see depends on their roles:

Page 18: Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.

SOUPS 2008

Department A

Department B

When Clerks and Process owners join Department A …

… John assigns their roles to them

When Analysts join Department B, Anne assigns their roles to them