PBAC-Formula(Pdf)

PBAC-Formula(Pdf)

PBACB Model Jaehong Park University of Texas at San Antonio (UTSA), San Antonio, Texas, USA, 78249 [email protected] Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 1 / 9 PBACB Model Definition PBACB Model Definition(1/3) 1 AU; A; AT; O and OR are acting users, action instances, action types, objects, and object roles respectively. − − 2 G; U; G 1 and U 1 are sets of role-specific variations of ‘wasGeneratedBy’ and ‘used’ dependencies and matching sets of inverse dependencies, respectively. − 3 f‘c’; ‘c 1’g is the set of ‘wasControlledBy’ dependency and its inverse dependency. 4 Base provenance data PDB forms a directed graph and is formally denoted as a triple < VB; EB; DB >: VB = AU [ A [ O, a finite set of acting users, action instances, and objects that have been involved in transactions in the system and are represented as vertices; −1 −1 −1 DB = f‘c’g [ U [ G [ f‘c ’g [ U [ G , a finite set of base dependency types; EB ⊆ f(A×AUבc’)[(A×O×U)[(O×A×G)[(AU×Aבc−1’)[(O×A×U−1)[(A×O×G−1)g, denoting dependency edges, is the set of existing base dependencies in the provenance data. Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 2 / 9 PBACB Model Definition PBACB Model Definition(2/3) 1 DNO, disjoint from DB, is a finite set of abstracted names for dependencies of objects. 2 Let Σ be an alphabet of terms in DB [ DNO. The set DPAT H of regular expressions is inductively defined as follows: 8p 2 Σ; p 2 DPAT H; 2 DPAT H; (P1jP2); (P1:P2); P1∗; P1+; P1? 2 DPAT H, where P1 2 DPAT H and P2 2 DPAT H. 3 DPAT HB ⊆ DPAT H, is the set of regular expression using only alphabet of terms in DB. 4 DLO : DNO ! DPAT H, defines each dn 2 DNO as a path expression. DLO is also viewed as a list of pairs of object dependency names and corresponding dependency paths. 5 λO : DNO ! DPAT HB, maps each dn 2 DNO to a path expression using only base dependency types db 2 DB by repeatedly expanding the definitions of any dni 2 DNO that occurs in DLO(dn). Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 3 / 9 PBACB Model Definition PBACB Model Definition(3/3) 1 PE is a language specified in the policy expression grammar PG. 2 P ⊆ PE, is a finite set of policies. 3 γ : AT ! P, a mapping of an action type to a policy. V 4 δO : O × DPAT HB ! 2 B , a function mapping an object and a base dependency path to vertices in PDB such that o2 2 δ(o1; dpath) iff there exists a path in PDB from o1 to o2 whose edge labels form a string that satisfies the regular expression dpath. Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 4 / 9 PBACB Model Access Evaluation PBACB Model Access Evaluation(1/3) Algorithm 1 AccessEvaluation(au; a; O) 1: (Rule Collecting Phase) 2: at a’s action type 3: p γ(at) 4: RULEUA user authorization rules UARule found in p 5: RULEAV action validation rules AVRule found in p 6: (User Authorization Phase) 7: (Action Validation Phase) 8: Evaluate a final truth value of UAuth and AVal using conjunctive connective Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 5 / 9 PBACB Model Access Evaluation PBACB Model Access Evaluation (2/3) 1: (User Authorization Phase) 2: for all rules in RULEUA do 3: Extract the path rule (Ob jRole; DName) from rules 4: Determine the object o 2 O, whose role is Ob jRole 5: Extract dependency path expression dpathb in DPAT HB from DName using λO function 6: Determine vertices by tracing base provenance data PDB through the paths expressed in dpathb that start from the object o using δO function 7: Determine the truth value by evaluating the result against the rule 8: end for 9: UAuth a combined truth value based on conjunctive or disjunctive connec- tives between rules Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 6 / 9 PBACB Model Access Evaluation PBACB Model Access Evaluation (3/3) 1: (Action Validation Phase) 2: for all rules in RULEAV do 3: Extract path rules (Ob jRole; DName) from rules 4: for all path rules extracted do 5: Determine the object o 2 O, whose role is Ob jRole 6: Extract dependency path expression dpathb in DPAT HB from DName us- ing λO function 7: Determine vertices by tracing base provenance data PDB through the paths expressed in dpathb that start from the object o using δO function 8: end for 9: Determine the truth value by evaluating the results of all the extracted path rules 10: end for 11: AVal a combined result based on conjunctive or disjunctive connectives between rules Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 7 / 9 PBACB Model Policy Grammar PBACB Model Policy Grammar Policy ::= “allow” < Req > “ ) ” < UARules > “ ^ ” < AVRules > j “true” Req ::= “(” < ActUser > “; ” < ActType > “; ” < Ob jRoles > “)” Ob jRoles ::= < Ob jRole > j < Ob jRole > “; ” < Ob jRoles > UARules ::= < UARule > j“(” < UARules > “)”j < UARules >< Connect >< UARules > AVRules ::= < AVRule > j“(” < AVRules > “)”j < AVRules >< Connect >< AVRules > Connect ::= _j^ UARule ::= < ActUser >< oper1 >< PathRule > AVRule ::= “j” < PathRule > “j” < oper2 >< Number > j < PathRule >< oper3 >< PathRule > PathRule ::= “(” < Ob jRole > “; ” < DName > “)” oper1 ::= “ 2 ”j“ < ” oper2 ::= “ = ”j“ , ”j“ ≥ ”j“ ≤ ”j“ < ”j“ > ” oper3 ::= “ = ”j“ , ”j“ ⊆ ” DName ::= dn1jdn2j ::: jdnn Number ::= [0 − 9]+ ActUser ::= au ActType ::= at1jat2j ::: jatm j j j Ob jRole ::= orole1 orole2 ::: orolek Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 8 / 9 PBACB Model Policy Grammar Jae Park (Institute for Cyber Security, UTSA) PBACB Model CS6393, April 5, 2013 9 / 9.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us