Access Control - Mandatory Access Control PDF

Document Details

EfficaciousPlumTree

Uploaded by EfficaciousPlumTree

Alexandru Ioan Cuza University of Iași

2023

Ferucio Laurențiu Tiplea

Tags

access control information security mac computer science

Summary

These are lecture notes for a course on Access Control, focusing on Mandatory Access Control (MAC). The document covers topics such as Introduction to MAC, Information Flow Models, Confidentiality-based policies (Bell-LaPadula model), Integrity-based policies (Biba model), combining models, Separation of duty (Chinese wall model), MAC implementations, and covert channels.

Full Transcript

Access Control Mandatory Access Control Prof.dr. Ferucio Laurenţiu Ţiplea Fall 2023 Department of Computer Science “Alexandru Ioan Cuza” University of Iaşi Iaşi 700506, Romania e-mail: [email protected] Outline Introduction to MAC Information flow models Confidentiality-based...

Access Control Mandatory Access Control Prof.dr. Ferucio Laurenţiu Ţiplea Fall 2023 Department of Computer Science “Alexandru Ioan Cuza” University of Iaşi Iaşi 700506, Romania e-mail: [email protected] Outline Introduction to MAC Information flow models Confidentiality-based mandatory policies: the Bell-LaPadula model Integrity-based mandatory policies: the Biba model Combining the BLP and Biba models Separation of duty: the Chinese wall model MAC implementations MAC and covert channels Concluding remarks on MAC models Introduction to MAC Mandatory access control Basic features : ˆ MAC enforces access control based on regulations mandated by a central authority; ˆ No concept of ownership in MAC; ˆ MAC makes distinction between users and subjects: ˆ Users are trusted (must be trusted) not to disclose secret information outside of the computer system; ˆ Subjects are not trusted (they may have Trojan horses embedded into the code they execute). MAC models : ˆ The Bell-LaPadula model (confidentiality); ˆ The Biba model (integrity); ˆ The Chinese wall model (separation of duty). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 2 / 39 Information flow models Information flow models Information flow (IF) models were introduced by Denning (1976). Basic features : ˆ IF models are concerned with the flow of information from one security class to another; ˆ Object = viewed as a container of information; ˆ Examples of objects: files or directories in an operating system, or relations and tuples in a database; ˆ Information flow is controlled by assigning every object a security class or security label. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 3 / 39 Information flow models: definition Definition 1 An information flow model is a triple (SC , →, ⊕), where: ˆ SC is a set of elements called security classes (or access classes or security labels); ˆ →⊆ SC × SC is a binary relation called may-flow; ˆ ⊕ : SC × SC → SC is a commutative and associative operator called the class combiner operator. Meaning: ˆ The semantics of a security class is varied and depends on the purpose of use (e.g., for confidentiality, integrity, categories or compartments of objects and subjects, etc.); ˆ A → B : the information may flow from A to B; ˆ A ⊕ B : if information from A and B are combined, the result belongs to A ⊕ B. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 4 / 39 Information flow models: Denning’s axioms Denning’s axioms: Axiom 1: SC is finite; Axiom 2: The may-flow relation → is a partial order; Axiom 3: SC has a least element w.r.t. →; Axiom 4: ⊕ is a least upper bound operator. Proposition 2 Any information flow model that satisfies the Denning’s axioms is a lattice. In what follows, all IF models we consider satisfy the Denning’s axioms! Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 5 / 39 Information flow models: dominance Definition 3 Let (SC , →, ⊕) be an information flow model and A, B ∈ SC. We say that A dominates B, denoted A ≥ B, if B → A. Notation and terminology: ˆ A > B (A strictly dominates B) if A dominates B and A ̸= B; ˆ A and B are comparable if A ≥ B or B ≥ A; ˆ A and B are incomparable if A and B are not comparable. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 6 / 39 Information flow models: examples A security class may be precisely a tag/label that specifies the sensitivity degree once attached to an object or subject. TS H H S A1 ··· An C L L U For example, if an object has the L label attached (see the first two lattices), it is considered an object with low sensitivity. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 7 / 39 Information flow models: examples A security class may also specify a security label and a set of categories (of objects or subjects). The security label then specifies the degree of sensitivity of all elements of one of the categories thus specified. {A, B, C } (TS, {Army , Nuclear }) {A, B} {A, C } {B, C } (S, {Army }) (S, {Nuclear }) {A} {B} {C } (U, ∅) {∅} (S, {Army }) specifies that all items in the Army category have a degree of sensitivity S, as do This lattice does not specify the degrees of items in the Nuclear category. However, sensitivity of its security classes, these being (S, {Army }) and (S, {Nuclear }) are different irrelevant as long as we have their lattice security classes. structure. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 8 / 39 Confidentiality-based mandatory policies: the Bell-LaPadula model Confidentiality-based mandatory policies Overview : ˆ Aim: control the direct and indirect flows of information by preventing leakages to unauthorized subjects; ˆ Subjects and objects are assigned security levels (security classes); ˆ The security level of an object, also called security classification, reflects the sensitivity of the information contained in the object; ˆ The security level of a subject, also called security clearance, reflects the user’s trustworthiness; ˆ Requests of subjects to access objects are regulated by means of their security classes. Each user with a security class assigned to it can connect to the system (as a principal) at any security class dominated by its security class. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 9 / 39 The Bell-LaPadula model: a minimalist approach Proposed by Bell and LaPadula (1973) to formalize the multilevel security policy of the U.S. Department of Defense. Overview of the Bell-LaPadula (BLP) model: ˆ Key idea: augment DAC with MAC to enforce information flow policies; ˆ Two-step approach: 1. First, a discretionary access control matrix D is established; 2. Second, operations must be authorized by the mandatory access control policy; ˆ The model was initially defined for a fixed set of rights R = {r , w }. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 10 / 39 The Bell-LaPadula model: a minimalist approach The MAC in the BLP model: ˆ Assign labels to subjects and objects by some labelling function λ; ˆ Rules (No Read Up – No Write Down): 1. Simple security (ss-) property – s is allowed to read o only if λ(s) ≥ λ(o) 2. ∗-property – s is allowed to write o only if λ(s) ≤ λ(o) Initially, the BLP model assumed that the labels of subjects and objects, once assigned, could not be changed (unless a security administrator resets them). This property has been called the tranquility principle. However, it can be relaxed without losing security (Sandhu (1993)). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 11 / 39 On the ∗-property Remark 4 The ∗-property avoids Trojan horse attacks because subjects cannot transfer information to a security class with lower sensitivity than their security clearance. Through the simple security property, any subject can transmit information (e.g., emails) to a higher (dominant) security class. Users are not restricted by the ∗-property, as they can connect to the system (as principals) at any security class dominated by their security clearance. Remark 5 The ∗-property allows secret data be destroyed or damaged by unclassified subjects. To prevent this the ∗-property is sometimes used in the form Strong ∗-property – s is allowed to write o only if λ(s) = λ(o) Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 12 / 39 The Bell-LaPadula model: remarks ˆ In some approaches, write access means “read and write”, with append access provided for “write only”; ˆ The BLP model is stated in terms of read and write operations (which suffices to illustrate the main points). Other operations may be added, such as create and destroy objects, constrained by the ∗-property because they modify the state of the object in question; ˆ Mandatory controls in BLP are coupled with discretionary control: if the access control matrix does not authorizes the operation, there is no need to check the mandatory controls since the operation will be rejected anyway; ˆ A user can login (create a subject) with any label dominated by the user’s clearance. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 13 / 39 Integrity-based mandatory policies: the Biba model Integrity-based mandatory policies Overview : ˆ Aim: control the flows of information and prevent subjects to indirectly modify information they cannot write; ˆ Subjects and objects are assigned integrity levels (integrity classes); ˆ The integrity level of an object reflects both the degree of trust of the information stored in the object and the potential damage resulting from unauthorized modifications of the information; ˆ The integrity level of a subject reflects the user’s trustworthiness for inserting, modifying, or deleting information; ˆ Requests of subjects to access objects are regulated by means of their integrity classes. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 14 / 39 The Biba model Proposed by Biba (1977). The MAC in the Biba model: ˆ associate labels to subjects and objects by some function ω; ˆ Rules (No Read Down – No Write Up): 1. Simple integrity (si-) property – s is allowed to read o only if ω(s) ≤ ω(o) 2. Integrity ∗-property – s is allowed to write o only if ω(s) ≥ ω(o) Remark 6 The Biba model’s rules are the dual of the BLP model’s rules. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 15 / 39 Combining the BLP and Biba models Combining the BLP and Biba Models ˆ There is no fundamental difference between the BLP and Biba models: both are concerned with information flow in a lattice of security classes; ˆ In the BLP model, the information flows upward; ˆ In the Biba model, the information flows downward; ˆ The direction is irrelevant: it is a matter of convention in representing the highest security class (in our case, in both the BLP and Biba models the highest security class on top of the lattice). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 16 / 39 Case 1: single label Combination 1 : use a single label for both confidentiality and integrity. Conclusions : ˆ s can read or write o only if s and o have the same security class! ˆ No information flow between security classes! ˆ Irrelevant model. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 17 / 39 Case 2: independent labels, same directions Combination 2 : use independent labels for confidentiality (λ) and integrity (ω) under the assumption that both lattices have the highest security class on top. Conclusions : ˆ Rules: 1. s is allowed to read o only if λ(s) ≥ λ(o) and ω(s) ≤ ω(o) 2. s is allowed to write o only if λ(s) ≤ λ(o) and ω(s) ≥ ω(o) ˆ The model uses two lattices with information flow going in opposite directions; ˆ Implemented in several operating system, database, and network products. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 18 / 39 Case 3: independent labels, opposite directions Combination 3 : use independent labels for confidentiality (λ) and integrity (ω) under the assumption that the lattices have the highest security classes on opposite directions. Conclusions : ˆ Rules: 1. s is allowed to read o only if λ(s) ≥ λ(o) and ω(s) ≥ ω(o) 2. s is allowed to write o only if λ(s) ≤ λ(o) and ω(s) ≤ ω(o) ˆ The two lattices can be combined in just one lattice (see next slide); ˆ In this lattice, the entity with highest confidentiality has lowest integrity, and vice versa. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 19 / 39 Case 3: example information flow λH ωL highest confidentiality highest integrity λL ωH λH ωL highest confidentiality, lowest integrity λH ωH λL ωL lowest confidentiality, highest integrity λL ωH Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 20 / 39 Separation of duty: the Chinese wall model Conflict of interest The Chinese wall model was proposed by Brewer and Nash (1989). Where it arises : ˆ In the commercial sector that provides consulting services to other companies. Aim : ˆ Prevent information flows that result in a conflict of interest and inadvertent disclosure of information by a consultant or contractor; ˆ Example of conflict of interest: lawyer providing consultancy services for two airline companies. How : ˆ Combines commercial discretion with legally enforceable mandatory controls. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 21 / 39 Conflict of interest and the Chinese wall Basic elements : ˆ Object = item of information concerning a single company; ˆ Company dataset = all objects which concern the same company; ˆ Conflict of interest class (CIC ) = all datasets of the companies that are in competition; ˆ Subject = user or program that might act on behalf of a user. Basic idea : ˆ In the first instance, each subject has complete freedom to access anything he cares; ˆ Once an object in a dataset D of some CIC is chosen, a Chinese Wall is created around D and no other dataset in CIC can be chosen by the same subject. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 22 / 39 The Chinese wall model Rules: ˆ (Chinese Wall) Simple Security Rule: a subject s can be granted read access to an object o only if the object: 1. is in the same company datasets as the objects already accessed by s, that is, “within the Wall”, or 2. belongs to an entirely different conflict of interest class. ˆ (Chinese Wall) ∗-property: a subject s can be granted write access to an object o only if: 1. s can read o by the simple security rule, and 2. no object can be read which is in a different company dataset to the one for which write access is requested ∗-property implies that either s cannot write at all or s is limited to reading from and writing to just one company dataset! Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 23 / 39 Reason for the ∗-property CIC: “Banks” Bank1 w r r Bank2 Alice Bob r OilC1 r Alice’s Wall: Bank1 , OilC1 Bob’s Wall: Bank1 , OilC2 Bob can read from OilC1 and OilC2 CIC: “Oil Companies” OilC2 ! Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 24 / 39 Criticisms of the model The ∗-property of the Chinese wall model protects against Trojan horse-like attacks. However, the price is unacceptable: 1. A user that reads two company datasets cannot write at all; 2. A user that is allowed to read just one company dataset can write only to that dataset. A typical activity of a user requires reading and writing operations. The Chinese wall model thus limits the activity of users only to working with a single company. Sandhu (1992) highlighted this. This anomaly occurs because the model does not distinguish between rules applied to users and subjects (see the concept of subject in this model). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 25 / 39 A variation of the model: user-principal-subject distinction w CIC: “Banks” Alice.Bank1 r Bank1 as th au r r Bank2 aut ha Alice s Alice.(Bank1 , OilC1 ) r OilC1 r Bob OilC2 CIC: “Oil Companies” Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 26 / 39 A lattice representation: object labeling The security labels are represented in the lattice bellow (Sandhu (1992)). ⊤ (Bank1 , OilC1 ) (Bank1 , OilC2 ) (Bank2 , OilC1 ) (Bank2 , OilC2 ) Bank1 OilC1 OilC2 Bank2 Public Info Object labeling : ˆ First level: public information; ˆ Second level: companies datasets; ˆ Third level: allowed combinations of companies datasets; ˆ Top level: combinations not allowed (this level might be empty). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 27 / 39 A lattice representation: user, principal, and subject labeling Labeling rules for users, principals, and subjects : ˆ Each user U may have associated any security label, except for ⊤; ˆ Each user U with the security label X has associated the principals U.Y , for any Y dominated by X ; ˆ Each principal U.Y has associated the fixed security label Y. Each subject created by the principal inherits this label. Example 7 If Alice has the security label Bank1 , then she has associated two principals, Alice.Public Info and Alice.Bank1. So, she can read from Public Info and Bank1 , and write to (Bank1 , OilC1 ) and (Bank1 , OilC2 ). The conflict of interest is thus avoided. This new model behaves as the BLP model! Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 28 / 39 MAC implementations MAC early implementations Early implementations (started out in the eighties, military-oriented): ˆ Honeywell Secure Communications Processor (SCOMP); ˆ Strategic Air Command DIgital Network (SACDIN) of the US Air Force (USAF); ˆ Boeing Multi-level Secure Local Area Network; ˆ etc. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 29 / 39 MAC recent implementations: SELinux Security-Enhanced Linux (SELinux): ˆ Linux kernel security module that provides a mechanism for supporting access control security policies, including MAC; ˆ The key concepts can be found in some earlier projects by United States National Security Agency (NSA) https://www.nsa.gov/selinux/. Subjects and objects: ˆ Subject security level = domain; ˆ Object security level = type; ˆ Type of an object = class. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 30 / 39 MAC recent implementations: SELinux SELinux has two types of rules: access rules and labeling rules: ˆ Access rules: ˆ Example: allow sshd.t shell.exec.t:file execute ˆ Meaning: when a subject of sshd.t accesses an object of shell.exec.t of class file, it has the execute permission; ˆ Rules for the type of a new object (labeling rules): ˆ Example: type.transition sshd.t tmp.t: devfile.class.set cardmsg.dev.t ˆ Meaning: when sshd daemon creates a device file in the tmp directory, the new file is labeled with cardmsg.dev.t. More on SELinux: Kuliamin et al. (2019); Vermeulen (2020). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 31 / 39 MAC recent implementations: AppArmor Application Armor (AppArmor): ˆ Linux kernel security module that supplements the traditional Unix DAC model by providing MAC; ˆ Originally developed by Immunix (1998-2005), then by SUSE (2005-2009), and currently by Canonical from 2009; ˆ Included in the mainline Linux kernel since version 2.6.36 (Oct 2010); ˆ A set of MAC rules in AppArmor is known as a profile; ˆ SELinux labels the files (according to the main theory on MAC), while AppArmor works with file paths; ˆ Two types of rules: ˆ path entries: what files an application can access in the file system; ˆ capability entries: privileges that are allowed to use. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 32 / 39 MAC recent implementations: MIC Mandatory Integrity Control in Windows operating systems: ˆ Starting with Windows Vista and Windows Server 2008, Microsoft adds a Mandatory Integrity Control (MIC) (Microsoft (2021)); ˆ MIC is a form of the Biba model ensuring integrity to writes and deletions: to write to or delete an object, the subject’s integrity level must be greater than or equal to the object’ integrity level; ˆ There are six integrity levels: Untrusted, Low (everyone), Medium (standard and authenticated users), High (local or network services, elevated users), System (system services), and Trusted Installer; ˆ Subjects’ integrity level: when a user logs on, Windows Vista assigns an integrity SID to the user’s access token; ˆ Objects’ integrity level: files, pipes, threads, registry keys, printers etc., are assigned an integrity SID which is stored in the System Access Control List (SACL). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 33 / 39 MAC recent implementations: MAC and MIC in IBM AIX 7.2 IBM AIX 7.2. Security: “Mandatory Access Control is enforced any time a process attempts to open a file system object, retrieve the attributes of a file system object, send a signal to a process, transfer data through a STREAM, or send or receive a packet through a network interface. Access to any file system object is only possible if both MAC and DAC criteria are met. When a user attempts to access a file, MAC restrictions are enforced before DAC restrictions, such as permission bits or ACLs, are checked.” “Trusted AIX uses a system of labels to enforce MIC. On a Trusted AIX system, all named objects have integrity labels (TLs) to identify the object’s integrity level. Processes also have TLs. Process TLs indicate which level of information integrity the process is allowed to access. The higher the TL, the more trustworthy the object or process is.” Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 34 / 39 MAC and covert channels Covert channels Definition 8 (From NIST SP 800-53 Rev.5) A covert channel is an unintended or unauthorized intra-system channel that enables two cooperating entities to transfer information in a way that violates the system’s security policy but does not exceed the entities’ access authorizations. ˆ They were signaled by Lampson (1973); ˆ Trusted Computer System Evaluation Criteria (TCSEC), also called the Orange Book, defines two kinds of covert channels: ˆ Storage channels – modify storage location to communicate; ˆ Timing channels – use a delay between packets transmitted over a network; ˆ Covert channels require a cooperating sender and receiver, are hard to detect and control, and can exist in any MAC system. MAC cannot protect against them! Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 35 / 39 Concluding remarks on MAC models Concluding remarks ˆ MAC enforces access control on the basis of regulations mandated by a central authority; ˆ MAC makes clear distinction between users and subjects; ˆ Lattice-based access control (LBAC), also called label-based access control or rule-based access control or multilevel access control, is a form of MAC; ˆ In LBAC, a lattice is used to define levels of security an object or subject may have; ˆ Mandatory policies protect the flow of information over overt channels (i.e., legitimate channels) but not over covert channels. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 36 / 39 Readings In addition to the materials indicated so far, I recommend: ˆ Chapters 6 and 7 of Conrad et al. (2016); ˆ Chapters 3 and 4 of Andress (2014); ˆ Chapter 11 of Collins (2014); ˆ Chapter 23 of Bertino (2012); ˆ Samarati and de Capitani di Vimercati (2001). Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 37 / 39 References References Andress, J. (2014). The Basics of Information Security. Understanding the Fundamentals of Infosec in Theory and Practice. Syngress, Elsevier, Boston, 2nd edition. Bell, D. E. and LaPadula, L. J. (1973). Secure computer systems: Mathematical foundations. Technical Report 2547, MITRE Corporation. Bertino, E. (2012). Chapter 23 - Policies, access control, and formal methods. In Das, S. K., Kant, K., and Zhang, N., editors, Handbook on Securing Cyber-Physical Critical Infrastructure, pages 573–594. Morgan Kaufmann, Boston. Biba, K. (1977). Integrity considerations for secure computer systems. Brewer, D. and Nash, M. (1989). The Chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy, pages 206–214. Collins, L. (2014). Chapter 11 - Access controls. In Vacca, J. R., editor, Cyber Security and IT Infrastructure Protection, pages 269–280. Syngress, Boston. Conrad, E., Misenar, S., and Feldman, J. (2016). CISSP Study Guide. Singress, Elsevier, 3rd edition. Denning, D. E. (1976). A lattice model of secure information flow. Commun. ACM, 19(5):236–243. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 38 / 39 References (cont.) IBM (2021). IBM AIX 7.2. Security. Technical report, IBM Corp. Kuliamin, V., Khoroshilov, A., and Medveded, D. (2019). Formal modeling of multi-level security and integrity control implemented with SELinux. In 2019 Actual Problems of Systems and Software Engineering (APSSE), pages 131–136. Lampson, B. W. (1973). A note on the confinement problem. Commun. ACM, 16(10):613–615. Microsoft (2021). Windows security. Technical report, Microsoft. Samarati, P. and de Capitani di Vimercati, S. (2001). Access control: Policies, models, and mechanisms. In Focardi, R. and Gorrieri, R., editors, Foundations of Security Analysis and Design, pages 137–196, Berlin, Heidelberg. Springer Berlin Heidelberg. Sandhu, R. (1993). Lattice-based access control models. Computer, 26(11):9–19. Sandhu, R. S. (1992). A lattice interpretation of the chinese wall policy. In Proc. of the 15th NIST-NCSC National Computer Security Conference, pages 329–339, Baltimore, MD. Vermeulen, S. (2020). SELinux System Administration. Packt Publishing, third edition. Prof.dr. F.L. Ţiplea, UAIC, RO Lectures on Information Security Access ControlMAC Fall 2022 39 / 39

Use Quizgecko on...
Browser
Browser