SECURITY FOR NEXT GENERATION HYPERTEXT SYSTEMS

Size: px
Start display at page:

Download "SECURITY FOR NEXT GENERATION HYPERTEXT SYSTEMS"

Transcription

1 Hypermedia, Vol. 6, No. 1, Taylor Graham Publ., London, 1994, pp SECURITY FOR NEXT GENERATION HYPERTEXT SYSTEMS DIETER MERKL, GÜNTHER PERNUL Universität Wien Institut für Angewandte Informatik und Informationssysteme Liebiggasse 4/3-4, A-1010 Wien, Austria {merkl ABSTRACT. This paper concerns the need for enhancing hypertext systems with security protection. We identify the elements of hypertext models which must be subject to security control. Main attention is directed toward hypertext and access control preventing the information stored from unauthorized disclosure or modification. From the class of known security models we consider the Discretionary Models, the Mandatory Models, the Personal Knowledge Approach, and the Clark and Wilson Model as candidates for the underlying security paradigm of hypertext systems. The security techniques considered originate from emphasizing different goals: Discretionary Models try to assign access privileges to users, Mandatory Models try to keep secrets, the Personal Knowledge Approach focuses on enforcing the constitutional right of informational self-determination of humans, and the Clark and Wilson Model tries to adapt common commercial security practice to computerized systems. The applicability of these security models to hypertext is discussed and their pros and cons are outlined. 1. INTRODUCTION As long as hypertext systems keep being small applications with a very small group of users, we are not forced to investigate security problems that arise by editing and using hypertext systems. Yet, since these systems are expected to grow both in terms of stored information items and users, we face at least two types of problems worth mentioning. First, there is the need for user assistance to keep the track while navigating through hyperspace and second, we have to protect the information units from loss, unauthorized access, destruction, use, modification or disclosure. Whereas the first problem has gained wide attention in the community (consult for example (1), (2), (3), (4), (5), to name but a few), the second problem has not found an appropriate forum so far. Nevertheless, it is the authors' opinion that real world hypertext applications do not have a chance for broad acceptance unless they employ some sort of security enforcement, or in other words provide a certain degree of information security. Obviously, this is true not only for hypertext systems, but for information systems in general. With the trend toward multi-user and multi-application hypertext systems and the increasing amount and sensitive nature of the information stored in the system, it is crucial that appropriate security measures be applied to hypertext systems as well. This paper can be seen as a first step toward a secure hypertext system. To achieve a certain degree of system security different security models for information systems have been proposed so far. For a brief survey consult (6) and for a detailed annotated bibliography (7). It is the purpose of this paper to review and briefly describe their structure and to apply the most prominent among them as the underlying security paradigm to a hypertext reference model. 1

2 To give an idea of security and related needs that may occur in hypertext systems, we discuss application domains well suited for hypertext systems in the following. Technical Manual. From a security point of view, technical manuals often have high requirements on the protection of the stored information. The situation can be described as having one manual for a heterogeneous group of users. The information one single user shall get from the manual heavily depends on the role the user has to perform in the organization. Information that is not necessary to fulfill her/his role should be hidden. Generally, the more sensitive the information is, the more restrictive must be the access. As an example consider the manual of an aircraft: Information about the navigation unit must not be accessible to the personnel whose duty is, for example, to check the seat belts although the information about the navigation unit and the proper functioning of seat belts may be contents of the same hypertext information system. Encyclopedia Books. It is common practice with printed encyclopedia books that the more the client pays the more information is offered. A similar practice can be employed with electronic books via a security or authorization policy. The more the user pays for the system, the more information trails are made available by the information provider. Business Information Systems. Consider a common business information system for a heterogeneous group of potential users. The system may cover information for clients, visitors, the security staff of the building, and the management as well. Evidently, instead of revealing all the information available for each user, the aim of such a system is to supply a particular group of users with only a fraction of the stored information. The amount of information offered may depend on the role the user is currently acting in. Legal Requirements. An additional impetus for security in hypertext systems emerges from legal requirements of many countries stating how stored information about humans has to be handled in order to protect the privacy of individuals. A number of countries have a privacy legislation although the various laws may differ. In order to build a framework, common principles were adopted by the member nations of the Organization for Economic Cooperation and Development (OECD). Summarizing the need for security in hypertext systems, it is obvious that with larger hypertext systems (both in terms of the heterogeneity of the users and the number of stored information items) these systems have to give the authors the opportunity to express their security requirements on the data they store in the system. Yet, of course, since the potential application areas for hypertext systems are not homogeneous in the sense of the sensitivity of the stored information items, there may be different security models applicable to hypertext systems. In general, the goal of a hypertext security model must be to offer an opportunity for information providers to specify and to restrict access to the stored information to those users and processes which have appropriate permission. The information in the system may therefore appear different to users performing different roles in the organization. This is due to the fact that a single user may only be aware of a subset of the stored information, namely the information which she/he is permitted to access. In contrast, if all users had the same privileges and rights, there would be no need for security control in hypertext systems. 2

3 The outline of this paper is as follows: In Section 2 we introduce the building blocks of hypertext systems and define a hypertext reference model. In Section 3 we investigate the applicability of security models to hypertext systems. The pros and cons of these models are discussed. Finally, Section 4 contains the conclusion and incites further research and development. 2. A FRAMEWORK FOR HYPERTEXT SECURITY In general, information security is a very broad topic and entails such things as moral issues imposed by public and society, legal issues where control is legislated over the collection and disclosure of information, or more technical issues such as how to protect the stored information from loss, unauthorized access, destruction, use, modification, or disclosure. The security features of the system are based on a certain security model and have to enforce the security requirements of the application. This paper is not intended to take such a broad perspective of information system security. Instead of covering the whole area main focus is directed to authorization policies. Pragmatically speaking, authorization specifies a set of rules of who has which type of access rights to what part of the information stored in the system. Thus, covering disclosure and modification of information by users. Before we can move to a more detailed discussion of access control in hypertext systems we will define the basic vocabulary used in the subsequent sections of this paper BUILDING BLOCKS OF HYPERTEXT SYSTEMS Node. A node is the basic structure for storing information in a hypertext system. Typically a hypertext system consists of a number of interconnected nodes. If the contents of the nodes consists exclusively of text one speaks of hypertext systems. If a node contains any sort of manageable media (e.g. text, sound, graphics, animation, music) one speaks of hypermedia systems. Depending on the implementation of the system a node may or may not be titled. Link. A link enables the connection between the nodes of the hypertext system. Each node may be connected to one or more other nodes by links. They open the possibility to move from one node to others. Usually a link starts at a distinct point within a node (this point is called the source of the link) and targets another node as a whole. The sources of links are often referred to as buttons. An usual way of moving from one node to another is by mouse-clicking on link buttons. The information stored in the referred node is then presented in a new window on the screen. In analogy to nodes, depending on the implementation of the system the links may or may not be titled. Graph. A hypertext graph is the sum of all hypertext nodes connected with hypertext links. Web. Usually one user is not interested in (or not authorized for) all the information stored in the hypertext system. Therefore the information has to be structured into nodes and regions covering similar information. Such regions are referred to as webs. Obviously, webs form subsets of the entire hypertext graph. Any one node may belong to several webs. Path. During the work with a hypertext system the nodes are accessed in a linear sequence. This sequence represents the path a user has taken through the hypertext graph. 3

4 Fig. 1 contains examples for the building blocks of hypertext systems as described above. The hypertext graph consists of eight interconnected nodes each of which is labeled node 1 through node 8, respectively. Nodes node 2 through node 5 as well as node 8 belong to the same web. A user is supposed to have taken the following path while browsing through the hypertext graph: At the beginning the user has seen node 1, then has continued the search at node 7, and so on until finally has reached node 4. In the figure the path is visualized using bold arrows for the links and bold boxes for the nodes the user has accessed during browsing. Graph Web node 6 node 1 node 7 node 2 node 8 node 3 node 4 node 5 Link Path Fig. 1: Basic elements of hypertext systems 2.2. A HYPERTEXT REFERENCE MODEL In order to keep the following survey of potential security models for hypertext systems as general as possible we have to relate our investigation to a hypertext reference model. The reference model consists of a set of nodes N, a set of links L, and a set of webs W representing semantically related nodes. Each of the nodes contains a certain amount of stored information. The nodes are atoms in the sense that a user cannot access only a fraction of a node. Apart from the stored information a node may contain a set of keywords describing its contents (i.e. some sort of meta-information). For a more detailed description of hypertext models and systems consult (8), (9), or (10). With the help of the links it is possible to build a directed connection between pairs of nodes. Each link starts at a distinct point within a node (i.e. source) and targets another node as a whole. Thus, the set of nodes together with the set of links form a directed graph. The user is offered two distinct facilities to retrieve information from the hypertext system. First, it is possible to follow chains of links from one node to others. Second, the user has the opportunity to move directly to a node. This by querying the system with a set of keywords 4

5 connected by Boolean operators describing the information needs of the users. As a result of the search the set of matching nodes is displayed to the user. Obviously, this resembles the way information can be obtained from conventional information retrieval systems. Only a particular set of users (i.e. system administrators) is allowed to delete nodes, certain users may add new information or may modify existing information while each user is permitted to establish new links. Emphasizing on the users of a hypertext system, we are faced with the fact that users can be classified within different categories depending on their information needs. Information security requirements are supposed to differ between the different categories of users. In this sense, in a hypertext system security control addresses at least the following issues: different types of access (e.g. read, delete, modify, add) sets of heterogeneous users different hypertext concepts (e.g. nodes, links, webs) In the following, the article surveys some intuitive approaches to security control in hypertext systems. The approaches are influenced by security techniques that are already implemented or at least discussed in the context of conventional information systems. 3. EXTENDING HYPERTEXT WITH SECURITY CONTROL Information security requires a mechanism to restrict the access of certain users to a particular subset of the information available in a computerized system. As we consider in our study a multiuser environment, access to information must be based on the identity of the accessing users. In the subsequent sections we assume the following system architecture: The hypertext system runs on top of a general purpose multi-user operating system. The operating system is responsible for the identification, authentication and auditing of actions operating on behalf of the users. If these security checks are passed properly, we consider the corresponding user as being authorized to access at least a subset of the information available in the hypertext system. However, it is the task of the security module of a hypertext system to protect the information that is not contained in this subset DISCRETIONARY HYPERTEXT SECURITY Discretionary security models are stated in terms of a set of security objects O, a set of security subjects S, a set of access privileges T defining the kind of access a subject has to a certain object, and a set of predicates P in order to represent content-based access rules. For a detailed study of discretionary controls consult (11) and for recent developments and open issues see (12). Discretionary hypertext security may be described by relations <O, S, T, P>. In this notation, O is the hypertext graph, S is the set of possible security subjects, T represents the different access types, and P is a set of predicates. An object o O is either a node, a link, or a web. A subject s S may either be a user, a group of users, or a transaction (e.g. query) operating on behalf of a user. The set of access privileges T is identical with the set of potential operations such as access (accessing the contents of an object o O in read-only mode), insert (augmenting the hypertext graph with new objects), delete (dropping objects), update (changing the contents of existing objects), grant (granting own privileges to others), and revoke (taking away previously granted access privileges). A predicate p P defines the view of a subject s S on the content of the 5

6 hypertext graph. The tuple <o, s, t, p> is called access rule and a function f is defined to determine if an authorization f(o, s, t, p) is valid or not: f: O S T P {True, False} For any tuple <o, s, t, p>, if f(o, s, t, p) evaluates to True, then subject s has privilege t (t T) to access an object o of the hypertext graph O within the range defined by predicate p. An important property of discretionary security models is the support of the delegation of rights where a right is defined as the (o, t, p)-portion of the access rule. A Subject s i S who holds the right (o, t, p) may be allowed to delegate that right to another subject s j S (i j). As a consequence of discretionary access control different webs as subsets of the global hypertext network are imposed. Please note that the notion of webs in this case denotes the fact that different users see different parts of the hypertext graph. This does not imply that the different parts (i.e. subsets of the hypertext graph) consist of semantically related nodes only.within a web, different privileges may exist. Regarding only the access and update privileges discretionary access control and the concept of webs in this model are comparable to the notion of webs in the Intermedia hypertext system (for a description of Intermedia see (13)). By evaluating the set of predicates assigned to each security subject, the users can be forced to act exclusively within the subset of information described by the predicates. By stating 'read-only' privileges, users can be prevented from updating or deleting information they are authorized to access. Discretionary access control has its main advantage in being very flexible to support the users with different views (i.e. access windows) on the information contained in the hypertext system. The information (nodes, links, as well as webs) a particular user is not authorized to access can be filtered out from the hypertext graph easily by means of predicates. However, we feel that discretionary controls cannot be applied as the underlying protection system to hypertext without modification. In particular we see two stringent limitations which both are due to the principle of delegation of rights: Users enforce the security policy. Discretionary access control is based on the concept of ownership of information. In such a model the ownership of information is assigned to the creator of the information items. The creator subject is allowed to grant access to others. This is in contrast to enterprise models where the whole enterprise is the owner of information and responsible for granting access to stored data. The direct consequence of this fact is the inconvenience that the burden of enforcing the security policy of the enterprise is in the responsibility of the users themselves and cannot be controlled by the enterprise without involving high costs. Thus, discretionary access controls are not suitable for applications where security is of main concern. As an example of a possible flaw against the security consider an authorized user s 1 with the privileges of accessing a certain node and inserting new nodes. Assume s 1 copies the information contained in this node and makes the copy available to another user s 2 who may not be authorized to access the contents of the original node. This is possible because the system considers s 1 as the 'owner' of the information stored in the copied node and thus, s 1 automatically possesses the right to grant access to the new node to s 2. 6

7 Discretionary models cannot prevent this flaw because they adhere to the principle of delegation of rights. Cascading authorization. The case where two or more subjects have the privilege of granting or revoking certain access rules to other subjects may lead to cascading revocation chains. As an example consider the situation given in Fig. 2. Here, subjects s 1, s 2, s 3, and access rule (o,s 1,t,p) are outlined. Subject s 2 receives the privilege (o,t,p) from s 1 and grants the access rule to s 3. Later, s 1 grants (o,t,p) again to s 3 but s 2 revokes (o,t,p) from s 3. The effect of these operations is that s 3 still has the authorization (from s 1 ) to access object o of the hypertext graph O by satisfying predicate p and using privilege t even if subject s 2 has revoked it. As a consequence subject s 2 might not be aware of the fact that authorization (o,s 3,t,p) is still in effect. (1) grant s 2 (4) revoke s 1 (2) grant s 3 Subject Level (3) grant Object Level (1) s 1 : grant(o,t,p) to s 2 (2) s 2 : grant(o,t,p) to s 3 (3) s 1 : grant(o,t,p) to s 3 (4) s 2 : revoke(o,t,p) from s 3 Fig. 2: Cascading revocation chains 3.2. MANDATORY HYPERTEXT SECURITY While discretionary models are more concerned with defining, modelling, and enforcing access to information, mandatory security models are in addition concerned with the flow of information within a system. Mandatory security is stated in terms of security objects O, security subjects S, and a lattice of security levels. Similar to discretionary security, the objects represent the stored 7

8 information and the subjects are the users or the processes operating on behalf of the users. Mandatory security requires that objects and subjects be assigned to certain security levels represented by a label. The label for an object o O is called its classification, class(o), whereas the label for a subject s S is called its clearance, clear(s). The classification represents the sensitivity of the labelled information while the clearance mirrors the trustworthiness of a subject not to disclose sensitive information to others. A security label consists of two components: a sensitivity level out of a hierarchical list (e.g. unclassified, classified, secret, top secret) and a category out of a set of categories. Thus, the set of security labels is partially ordered and forms a class lattice. Mandatory security as developed by Bell and LaPadula (14) in the early 1970's is perhaps the best known and most widely accepted model to serve as the basis for security control in computerized systems with high security needs. The Bell and LaPadula model states the security requirements in terms of a simple security property and a *-property. In this paper we consider a slightly modified version of the original *-property, the so-called restricted *-property. The first rule (i.e. simple security property) protects the information from unauthorized disclosure, and the second (i.e. *-property) protects data from contamination or unauthorized modification by restricting the information flow from high to lower trusted subjects. (1) Subject s is allowed to read item o if clear(s) class(o). (2) Subject s is allowed to write o if class(o) = clear(s). The simple security property provides that no subject can read an information item unless the current security level of the subject dominates the security level of the object. This is also known as the read-up restriction. The *-property deals with the problem of unauthorized information flow. A subject is prevented from writing information into an object with a lower security level than the subject's clearance (clear(s) > class(o)); thereby giving other users access to information they are not intended to have. This is also known as the write-down restriction. For a more detailed study on the mandatory security model consult (15), or (16). Mandatory security grew out of the military environment where it is common practice to classify both users and information with different sensitivity or security levels. In this environment, security labels like 'unclassified', 'classified', 'secret', or 'top secret' are typically found. Although labelling of information is common in many large business organizations (there, the labels are similarly termed: 'confidential', 'company confidential', etc.), mandatory systems suffer from their inability to properly represent the variety and nature of social roles of users in the lattice structure of security labels. To overcome this and other limitations, several extensions of the basic lattice structure model have been proposed so far (for example see (6), (7), and (15)). It is the objective of further research to investigate their applicability for hypertext systems. In this paper we limit ourselves to the original mandatory security model as described above. Applying mandatory security to hypertext, the set of nodes containing the information and the set of links forming the paths to the information are subject to security classification, while the set of users are subject to certain security clearances. We suggest that each link inherits the highest security label from the connected nodes to ensure consistency of the labelled objects. Since our hypertext reference model allows the retrieval of information by either navigating through information by means of the predefined paths or by using querying facilities, it is necessary to assign nodes as well as links to security labels. By using the query facilities of the system, mandatory access control can filter out all nodes that are referenced by the user supplied query but 8

9 labelled at a classification level higher than the clearance of the user. By using predefined paths and the technique of navigating between the different nodes in the hypertext graph, mandatory access controls can be used to hide higher classified nodes and links from a particular user. More generally, a mandatory hypertext security model divides the information available into distinct and separate areas. A user may only access data within an area at a specified security level. Security levels are usually considered as being static, and changes of the secrecy of the labelled information may not occur frequently. In case downgrading or upgrading of the secrecy of information be required, it can only be performed by an authorized security officer. In comparison with discretionary access control, one of the main advantages of mandatory security systems is that they assume the ownership of information by a central authority. This person is responsible for carefully analyzing the information and assigning corresponding security classifications. This overcomes the limitations inherent in discretionary systems which are due to the principle of delegation of rights. We see a considerable potential for mandatory protection in hypertext systems. In case a hypertext system is rather considered for retrieving than for updating information, a restricted version of mandatory security control may be sufficient. In this restricted version main emphasis should be given to control the read access of the users, i.e. the unauthorized disclosure of information. In such an environment, information flow control by using the *-property might not be necessary. An interesting optional feature of mandatory security is that it may lead to polyinstantiation. Polyinstantiation is the simultaneous existence of multiple information instances referring to the same real world concept but differing by their classification level and by their contents. As an example, consider a hypertext system containing technical information about an aircraft. Suppose, each of the potential users knows that all the knowledge and technical information about the type of aircraft under consideration is stored in the system. Furthermore, assume the existence of a security policy of the manufacturer requires that the information regarding the navigation unit be considered as 'top secret'. From a security point of view it is sometimes not enough to simply hide part of the information available from insufficiently cleared users. Since from knowing that the information is stored in the system but without having access to it the users can infer that sensitive information must exist they are not authorized to access. A hypertext system supporting the security requirement that users should not be able to infer information by the knowledge of certain facts must support polyinstantiation of hypertext nodes. The situation described above can be solved by introducing a second node n' for an existing node n. Both nodes, n and n' are referring to the same real world object (i.e. in our example to the navigation unit) but contain different information and have a different security classification. In this example, node n' will contain restricted information on the navigation unit (even wrong information may be stored intentionally) and is usually called cover story of node n. Node n will contain the proper information available about the real world object and will have a classification that dominates the security level of node n'. In hypertext systems where users are responsible for extending the system by further nodes, polyinstantiation of information units may also become necessary. Consider the case where a user tries to insert a node into a hypertext graph referring to a real world concept already present in the system but classified above the users clearance. In this case the user does not know that this concept has already been described in the system. The system has to perform the insert operation and has to polyinstantiate the information. The reason for having to do this, of course, is due to the policy that the user must not be told that there is information contained in the system which she/he 9

10 is not authorized to see. The requirement for polyinstantiation of information units was first considered for operating systems supporting mandatory security, later adopted for databases and may also have some potential when mandatory security is applied to hypertext systems. Fig. 3 contains an example of a hypertext network in a system supporting mandatory access controls. For the sake of simplicity, we only consider two different security levels in this example - classified (C) and unclassified (UC). For a user with a clearance of UC only the hypertext links visualized as full lines and the nodes drawn as full boxes are visible when browsing through hyperspace. In contrast, a user with a clearance of C may in addition browse along the dashed links and as a consequence access the dashed boxed nodes. Nodes node 5 and node 5 are an example of polyinstantiation where users s C and s UC (the indices denote the clearances of the users) are not supplied with the same contents of the node. As explained above, this situation may have arisen because there is a need to support users s UC with a cover story only, or because s UC has inserted a node with information referring to a real world object already present in the system but classified above the users clearance. In this example and because of the read access rule users s C have access to both nodes, node 5 and node 5. node 1 UC node 4 C node 6 C node 2 UC node 3 UC node 7 UC node 5 C node 5 UC Fig. 3: Hypertext network with polyinstantiated nodes 3.3. OTHER APPROACHES In this Section we concentrate on two different approaches to information security. These are the Clark and Wilson Model and the Personal Knowledge Approach. Both security models have gained considerable importance in the field of information security but may only have their potential for special purpose hypertext systems. Fundamental for both approaches is the concept of role-based security where authorization depends on the role a user performs in the organization. This is in contrast to the attempts of security as described previously where authorization is based on the users' identity. The following contains our interpretation of the two models. 10

11 THE CLARK AND WILSON MODEL The Clark and Wilson approach (17) to security originates from a comparison between military (mostly following the mandatory security paradigm) and commercial security requirements and the findings that these requirements are not directly compatible. The main concern of the Clark and Wilson Model is to identify security requirements for commercial information systems and to provide strategies to meet these requirements. In mandatory security main attention is directed toward the flow of classified information within the organization and among the users. Thus, in such an environment an information system providing a certain degree of security is aimed at regulating the access to information by controlling its flow. In contrast, a considerable part of today's business data processing focuses on preventing vital information from intentional corruption or accidental modification. Thus, Clark and Wilson argue that the primary goal of information security is to enforce the integrity rather than the privacy of the stored information. Violation of the integrity of the stored information may only occur by updating the stored data. Thus, the Clark and Wilson Model is mainly applicable to hypertext systems where the stored information is subject to frequent update operations. In order to achieve information security, the Clark and Wilson Model relies on two basic concepts, namely: Well-formed transactions. A well-formed transaction operates on an assigned set of information items. These transactions need to be formally verified assuring that all relevant security and integrity properties are satisfied. Well-formed transactions are the means to assure that information items are not manipulated arbitrarily but only in constrained ways that preserve or ensure the integrity of the stored information. For hypertext systems a well-formed transaction may only operate on a predefined set of nodes by using a predefined set of links. Separation of duty. The principle of separation of duty requires that all operations that have to be performed must be divided into several suboperations, each of which has to be executed by a different person to ensure that each operation is observed by several persons. Thus, providing the external consistency of the stored information items (i.e. correspondence between the stored data objects and their counterparts in the real world). As a consequence, hypertext objects are not necessarily associated with a security level but rather with a set of transactions permitted to manipulate them. Furthermore, users are not authorized to read/write certain data items but rather have the authority to execute certain transactions operating on certain data items. Concerning well-formed transactions we find some applications in hypertext systems. Information, for example, should only be retrieved and updated by means of well-formed transactions operating on predefined information items and predefined paths. In addition, a well-formed transaction may only be executed by users that perform a certain role within the organization. We see main potential for this security policy in so called 'closed' hypertext systems where a particular user may only browse along predefined paths. As an example consider a museum hypertext system where users obtain information only by following completely predefined paths (i.e. guided tours). Because of the concept of well-formed transactions a hypertext system adhering to the Clark and Wilson Model may not support ad-hoc querying facilities. 11

12 THE PERSONAL KNOWLEDGE APPROACH The Personal Knowledge Approach (18), (19) focuses on protecting the privacy of individuals by controlling the access to stored information. The main goal of this model is to meet the right of humans to informational self-determination as requested in Constitutional Laws of many countries. Informational self-determination can be described as the right of humans to decide whether private information not available to the public may be kept in an information system or not. The Personal Knowledge Approach is built around the concept of a person and her/his knowledge. A person is either a user having access to the information system or an individual about whom information is stored in the system. Each person has a set of authorities and performs a role in the organization. Thus, the main application field of systems supporting this approach to information security are those where mainly information about humans is stored. More technically, this approach uses concepts found in the object-oriented world and in secure operating systems. In the system a person is represented as an encapsulated object while the knowledge of a person is a relational database. A person is only aware of information about herself/himself and of her/his relationship to other person, i.e. his/her acquaintances. This is the only permanent knowledge a person may have and if she/he wants to know something about another person, that person must be asked. The set of acquaintances of a person describes the social environment of the person, i.e. with whom the person may communicate. Communication is performed by means of messages. The receiver of a message responds to the message only if the sender possesses appropriate authorities and is assigned particular roles in the organization. For hypertext systems we can interpret this security technique as follows: The Personal Knowledge Approach assumes an active role for the information stored in a system. Moreover, the information should refer to humans. In addition to its information contents, each node of a hypertext system must have permanent knowledge about the roles that may be performed in the organization. Users are assigned certain roles within the organization. Each role corresponds to a number of statically declared acquaintances (nodes of the hypertext system) and a number of dynamically assigned authorities (privileges on operations that may be performed with the nodes). Depending on the role a user is currently acting in she/he may derive information from a node (if the node is acquainted with the role the user is acting in) and may follow certain links to other nodes. Each node has the knowledge of which links start from it and of which authorities are necessary for a user to follow a particular link. 4. CONCLUSION The implementation of access control in multi-user and multi-application hypertext systems is crucial to ensure necessary security measures. Access control concepts developed for information systems, in particular database systems, may provide a basis for the investigation of security techniques for hypertext systems. In this paper we have discussed different approaches concerned with modeling and expressing information security needs in hypertext systems. The discretionary security approach may be the primary choice if a high degree of security is not necessary. Keeping the responsibility to enforce 12

13 a security policy at the users side is only adequate if potential threats against security will not result in considerable damage. Mandatory security models offer the most powerful protection mechanisms against unauthorized disclosure and modification of information. The approach of personal knowledge is an interesting alternative for applications where information about humans is kept and where the need to respect the right for informational self-determination exists. Moreover, we believe that object-oriented concepts (e.g. the property of object encapsulation) as used in this model come very close to the 'nature' of hidden personal knowledge and may correspond to the practice of separating information into different nodes in hypertext systems. The Clark and Wilson model may also be an alternative since security enforcement is delegated to the application programs. We believe, however, that this security policy is suitable only for special purpose hypertext systems with very high update rates on the stored information units as well as for hypertext systems where the only way to access information is by means of predefined paths. All four approaches originate from emphasizing different goals. In a nutshell, discretionary models try to assign privileges, mandatory models try to keep secrets, the Clark and Wilson approach guards security by well-formed transactions, and the approach of personal knowledge focuses on the constitutional right of informational self-determination. We feel that information security may need to deal with all aspects discussed above even if the degree of a goal might vary among different applications. It should be recognized that information security is not an isolated problem but an entire system problem. Although not discussed in this paper, further security issues for systems with high security needs may include personnel security, procedural security, network security, encryption, hardware protection, software verification, add-on security packages and others. Last but not least it is important to note that computer security in general is subject to many national and international standardization efforts. These efforts were started in the USA with a national proposal for computer security in general (20) and later on extended to networks and databases. Recently, standardization efforts have moved over to Europe where security proposals of several European countries have been unified into a common harmonized proposal by the Commission of the European Communities (21). In the authors' opinion the hypertext community will be faced with information security aspects in the near future. REFERENCES 1. FOSS, C.L. Tools for reading and browsing hypertext. Information Processing and Management, 25(4), MARCHIONINI, G. and SHNEIDERMAN, B. Finding Facts vs. Browsing in Hypertext Systems. IEEE Computer, 21(1), NIELSEN, J. The art of navigating through hypertext. Communications of the ACM, 33(3), TOMEK, I. and MAURER, H. Helping the user to select a link. Hypermedia, 4(2), TRIGG, R. H. Guided Tours and Tablestops: Tools for Communicating in a Hypertext Environment; ACM Trans. on Office Information Systems (TOIS), 6(4), PERNUL, G. and TJOA, A M. Database Security Policies; Proceedings of the Int'l Conf. on Safety and Reliability of Computers (SAFECOMP-92), Pergamon Press, PERNUL, G. and LUEF, G. A Bibliography on Database Security. ACM SIGMOD Record, 21(1),

14 8. CONKLIN, J. Hypertext - An introduction and survey. IEEE Computer, 20(1), HALL, P.A.V. and PAPADOPOULOS, S. Hypertext systems and applications. Information and Software Technology, 32(7), NIELSEN, J. Hypertext and Hypermedia. Academic Press, San Diego, CA, FERNANDEZ, E. B., SUMMERS, R. C. and WOOD, C. Database Security and Integrity. Addison-Wesley, Reading, Mass, LUNT, T. F. Security in Database Systems: A Research Perspective. Computers & Security, 11, YANKELOVICH, N., HAAN, B., MEYROWITZ, N. and DRUCKER, S. M. Intermedia: The Concept and the Construction of a Seamless Information Environment. IEEE Computer, 21(1), BELL, D. E. and LAPADULA, L. J. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, Mass, LANDWEHR, C. E. Formal Models for Computer Security. ACM Computing Surveys, 13(2), MILLEN, J. K. Models of Multilevel Computer Security. in: Advances in Computers (M. C. YOVITS, ed.), 29, Academic Press, San Diego, CA, CLARK, D. D. and WILSON, D. R. A Comparison of Commercial and Military Computer Security Policies. Proceedings of the IEEE Symposium on Research in Security and Privacy, BISKUP, J. and BRÜGGEMANN, H. H. The Personal Model of Data: Towards a Privacy-Oriented Information System. Computers & Security, 7, BISKUP, J. and BRÜGGEMANN, H. H. The Personal Model of Data: Towards a Privacy Oriented Information System (extended abstract). Proceedings of the 5 th Int'l Conference on Data Engineering, IEEE Computer Society Press, Trusted Computer System Evaluation Criteria. US National Computer Security Center, Technical Report DoD STD, Information Technology Security Evaluation Criteria (ITSEC). Provisional Harmonized Criteria. Commission of the European Communities, Brussels, June

Discretionary Vs. Mandatory

Discretionary Vs. Mandatory Discretionary Vs. Mandatory Discretionary access controls (DAC) Privilege propagated from one subject to another Possession of an access right is sufficient to access the object Mandatory access controls

More information

Access Control Models

Access Control Models Access Control Models Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Access Control Models Access Control to regulate

More information

Issues of Operating Systems Security

Issues of Operating Systems Security ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic

More information

[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No.

[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. [19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. 1 (March 1976), 9-36. [20] J. Biskup, H. H. Brüggemann. Das datenschutzorientierte

More information

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database

More information

Access Control. Discretionary Access Control

Access Control. Discretionary Access Control Access Control Discretionary Access Control 1 Outlines Access Control Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC) 2 Access Control Access control

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Access control models and policies. Tuomas Aura T Information security technology

Access control models and policies. Tuomas Aura T Information security technology Access control models and policies Tuomas Aura T-110.4206 Information security technology 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline 2 ACCESS CONTROL 3 Access control

More information

Security Models Trusted Zones SPRING 2018: GANG WANG

Security Models Trusted Zones SPRING 2018: GANG WANG Security Models Trusted Zones SPRING 2018: GANG WANG Access Control Slides credit to Ethan L. Miller and Scott A. Brandt Protection Domains Three protection domains Each lists objects with permitted operations

More information

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if Asset Analysis Asset Analysis -I It discovers the assets that result in an impact (a loss for the organization) if successfully attacked It should discover which ICT resources an organization needs to

More information

Access Control. Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions

Access Control. Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection

More information

Chapter 6: Integrity Policies

Chapter 6: Integrity Policies Chapter 6: Integrity Policies Overview Requirements Biba s models Clark-Wilson model Slide #6-1 Overview Requirements Very different than confidentiality policies Biba s model Clark-Wilson model Slide

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Access Control. Protects against accidental and malicious threats by

Access Control. Protects against accidental and malicious threats by Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection

More information

Lecture 4: Bell LaPadula

Lecture 4: Bell LaPadula CS 591: Introduction to Computer Security Lecture 4: Bell LaPadula James Hook Objectives Introduce the Bell LaPadula framework for confidentiality policy Discuss realizations of Bell LaPadula References:

More information

CCM Lecture 12. Security Model 1: Bell-LaPadula Model

CCM Lecture 12. Security Model 1: Bell-LaPadula Model CCM 4350 Lecture 12 Security Model 1: Bell-LaPadula Model Why Security Models? When we have implemented a security policy, do we know that it will (and can) be enforced? E.g., if policies get too intricate,

More information

Computer Security. Access control. 5 October 2017

Computer Security. Access control. 5 October 2017 Computer Security Access control 5 October 2017 Policy and mechanism A security policy is a statement of what is, and what is not, allowed. A security mechanism is a method, tool or procedure for enforcing

More information

May 1: Integrity Models

May 1: Integrity Models May 1: Integrity Models Biba Clark-Wilson Comparison Trust models May 1, 2017 ECS 235B Spring Quarter 2017 Slide #1 Integrity Overview Requirements Very different than confidentiality policies Biba s models

More information

CS 591: Introduction to Computer Security. Lecture 3: Policy

CS 591: Introduction to Computer Security. Lecture 3: Policy CS 591: Introduction to Computer Security Lecture 3: Policy James Hook Objectives Explore what a security policy is; develop a vocabulary to discuss policies Examine the role of trust in policy 1 What

More information

A Practical Look into GDPR for IT

A Practical Look into GDPR for IT Andrea Pasquinucci, March 2017 pag. 1 / 7 A Practical Look into GDPR for IT Part 1 Abstract This is the first article in a short series about the new EU General Data Protection Regulation (GDPR) looking,

More information

Labels and Information Flow

Labels and Information Flow Labels and Information Flow Robert Soulé March 21, 2007 Problem Motivation and History The military cares about information flow Everyone can read Unclassified Few can read Top Secret Problem Motivation

More information

Access Control (slides based Ch. 4 Gollmann)

Access Control (slides based Ch. 4 Gollmann) Access Control (slides based Ch. 4 Gollmann) Preliminary Remarks Computer systems and their use have changed over the last three decades. Traditional multi-user systems provide generic services to their

More information

Chapter 7: Hybrid Policies

Chapter 7: Hybrid Policies Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Slide #7-1 Overview Chinese Wall Model Focuses on conflict of interest CISS Policy Combines

More information

Trustworthiness Based Authorization on WWW

Trustworthiness Based Authorization on WWW CERIAS Tech Report 2002-08 Trustworthiness Based Authorization on WWW Y. Zong, B. Bhargava, M. Mahoui Center for Education and Research in Information Assurance and Security & Department of Computer Science,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Category Theory in Ontology Research: Concrete Gain from an Abstract Approach

Category Theory in Ontology Research: Concrete Gain from an Abstract Approach Category Theory in Ontology Research: Concrete Gain from an Abstract Approach Markus Krötzsch Pascal Hitzler Marc Ehrig York Sure Institute AIFB, University of Karlsruhe, Germany; {mak,hitzler,ehrig,sure}@aifb.uni-karlsruhe.de

More information

Operating System Security. Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own)

Operating System Security. Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own) Operating System Security Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own) Hw1 grades out this Friday Announcement Travel: out of town

More information

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Database Security Overview. Murat Kantarcioglu

Database Security Overview. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Database Security Overview Murat Kantarcioglu Topics The access control model of System R Extensions to the System R model Views and content-based

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

Advanced Systems Security: Integrity

Advanced Systems Security: Integrity Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

UML-Based Conceptual Modeling of Pattern-Bases

UML-Based Conceptual Modeling of Pattern-Bases UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an

More information

Intrusion Detection Types

Intrusion Detection Types Intrusion Detection Continued Tom Longstaff SM Software Engineering Institute Pittsburgh PA 1521 The is sponsored by the Advanced Research Projects Agency (ARPA). The Software Engineering Institute is

More information

INFORMATION RETRIEVAL SYSTEM: CONCEPT AND SCOPE

INFORMATION RETRIEVAL SYSTEM: CONCEPT AND SCOPE 15 : CONCEPT AND SCOPE 15.1 INTRODUCTION Information is communicated or received knowledge concerning a particular fact or circumstance. Retrieval refers to searching through stored information to find

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 A. OVERRIDING OBJECTIVE 1.1 This Directive establishes the framework for information management of the Asian Infrastructure Investment

More information

Advanced Systems Security: Integrity

Advanced Systems Security: Integrity Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

Content-based Management of Document Access. Control

Content-based Management of Document Access. Control Content-based Management of Document Access Control Edgar Weippl, Ismail Khalil Ibrahim Software Competence Center Hagenberg Hauptstr. 99, A-4232 Hagenberg, Austria {edgar.weippl, ismail.khalil-ibrahim}@scch.at

More information

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation DCU Guide to Subject Access Requests Under Irish Data Protection Legislation Context Under section 4 of the Irish Data Protection Acts 1988 & 2003 an individual, on making a written request to DCU, may

More information

Integrity Policies. Murat Kantarcioglu

Integrity Policies. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Integrity Policies Murat Kantarcioglu Requirements of Policies for Commercial Applications [Lipner 1982] 1. Users will not write their own

More information

Access control models and policies

Access control models and policies Access control models and policies Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2013 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline

More information

P1_L6 Mandatory Access Control Page 1

P1_L6 Mandatory Access Control Page 1 P1_L6 Mandatory Access Control Page 1 We discussed access control in the last lesson. But that was only one kind of access control called discretionary access control, or DAC. That allows you to decide

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Access control models and policies

Access control models and policies Access control models and policies Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline

More information

CSE509: (Intro to) Systems Security

CSE509: (Intro to) Systems Security CSE509: (Intro to) Systems Security Fall 2012 Radu Sion Integrity Policies Hybrid Policies 2005-12 parts by Matt Bishop, used with permission Integrity Policies: Overview Requirements Very different than

More information

UNIT I. Introduction

UNIT I. Introduction UNIT I Introduction Objective To know the need for database system. To study about various data models. To understand the architecture of database system. To introduce Relational database system. Introduction

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 12: Database Security Department of Computer Science and Engineering University at Buffalo 1 Review of Access Control Types We previously studied four types

More information

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data Privacy Policy Datacenter.com (referred to as we, us, our, Datacenter or the Company ) is committed to protecting your privacy and handling your data in an open and transparent manner. The personal data

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

PPKM: Preserving Privacy in Knowledge Management

PPKM: Preserving Privacy in Knowledge Management PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS Vijayalakshmi Atluri 1, Elisa Bertino 2, Elena Ferrari 3 Pietro Mazzoleni 2 1 MSIS Department CIMIC, Rutgers University, atluri@cimic.rutgers.edu

More information

SOME TYPES AND USES OF DATA MODELS

SOME TYPES AND USES OF DATA MODELS 3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model

More information

Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU

Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU Vadim A. Ermolayev Zaporozhye State University, 66, Zhukovskogo st., 330600, Zaporozhye,

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional

More information

6.001 Notes: Section 8.1

6.001 Notes: Section 8.1 6.001 Notes: Section 8.1 Slide 8.1.1 In this lecture we are going to introduce a new data type, specifically to deal with symbols. This may sound a bit odd, but if you step back, you may realize that everything

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

PCO Data Protection and Privacy Policy

PCO Data Protection and Privacy Policy PCO Data Protection and Privacy Policy [MCI Group Holding SA, 9, Rue du Pré-Bouvier, 1242 Satigny, Geneva, Switzerlandor relevant MCI entity] ( MCI ) is an event and association management company with

More information

Security Issues in Databases

Security Issues in Databases 2009 Second International Conference on Future Information Technology and Management Engineering Security Issues in Databases Sohail IMRAN College of Computing and Information Sciences Karachi Institute

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

Complex Access Control. Steven M. Bellovin September 10,

Complex Access Control. Steven M. Bellovin September 10, Complex Access Control Steven M. Bellovin September 10, 2013 1 Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix

More information

8.3 Mandatory Flow Control Models

8.3 Mandatory Flow Control Models 8.3 Mandatory Flow Control Models Mingsen Xu Advanced Operating System 2011-10-26 Outline Mandatory Flow Control Models - Information Flow Control - Lattice Model - Multilevel Security Model - Bell-Lapadula

More information

Access Control Models Part II

Access Control Models Part II Access Control Models Part II CERIAS and CS &ECE Departments Pag. 1 Introduction Other models: The Chinese Wall Model it combines elements of DAC and MAC RBAC Model it is a DAC model; however, it is sometimes

More information

Access Control Mechanisms

Access Control Mechanisms Access Control Mechanisms Week 11 P&P: Ch 4.5, 5.2, 5.3 CNT-4403: 26.March.2015 1 In this lecture Access matrix model Access control lists versus Capabilities Role Based Access Control File Protection

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts:

Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts: The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application of mandatory policies in relational database systems. Based on the sec classifications introduced in BLP. It extends the

More information

Harmonization of usability measurements in ISO9126 software engineering standards

Harmonization of usability measurements in ISO9126 software engineering standards Harmonization of usability measurements in ISO9126 software engineering standards Laila Cheikhi, Alain Abran and Witold Suryn École de Technologie Supérieure, 1100 Notre-Dame Ouest, Montréal, Canada laila.cheikhi.1@ens.etsmtl.ca,

More information

Safeguarding Unclassified Controlled Technical Information

Safeguarding Unclassified Controlled Technical Information Safeguarding Unclassified Controlled Technical Information (DFARS Case 2011-D039): The Challenges of New DFARS Requirements and Recommendations for Compliance Version 1 Authors: Justin Gercken, TSCP E.K.

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Policy, Models, and Trust

Policy, Models, and Trust Policy, Models, and Trust 1 Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact with the system, Objects:the informational and

More information

Aspects of an XML-Based Phraseology Database Application

Aspects of an XML-Based Phraseology Database Application Aspects of an XML-Based Phraseology Database Application Denis Helic 1 and Peter Ďurčo2 1 University of Technology Graz Insitute for Information Systems and Computer Media dhelic@iicm.edu 2 University

More information

Security and Authorization

Security and Authorization Security and Authorization Sub-sets of SQL Data retrieval: SELECT Data Manipulation Language (DML): INSERT, UPDATE, DELETE Data Definition Language (DDL): CREATE, ALTER, DROP, RENAME Transaction control:

More information

Overview of Information Security

Overview of Information Security Overview of Information Security Lecture By Dr Richard Boateng, UGBS, Ghana Email: richard@pearlrichards.org Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Pag. 1 and UGBS Outline Information

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

Advanced Systems Security: Integrity

Advanced Systems Security: Integrity Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

Opinion 02/2012 on facial recognition in online and mobile services

Opinion 02/2012 on facial recognition in online and mobile services ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of

More information

TREND MICRO PRIVACY POLICY (Updated May 2012)

TREND MICRO PRIVACY POLICY (Updated May 2012) TREND MICRO PRIVACY POLICY (Updated May 2012) Trend Micro Incorporated and its subsidiaries and affiliates (collectively, "Trend Micro") are committed to protecting your privacy and ensuring you have a

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Access Control in Federated Systems

Access Control in Federated Systems Access Control in Federated Systems Sabrina De Capitani di Vimercati Pierangela Samarati Dipartimento di Scienze dell Informazione Universiti di Milan0 via Comelico 39/41 Milan0 20135, Italy Phone: +39-2-55006257

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

DoD STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER

DoD STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DECEMBER l985 December 26,

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 11 - Access Control October 10, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/ Access Control System Protection Domain What can be accessed by a process Default

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Internet copy. EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement

Internet copy.  EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement EasyGo security policy Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement This copy of the document was published on and is for information purposes only. It may change without further

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

OPINION ON THE DEVELOPMENT OF SIS II

OPINION ON THE DEVELOPMENT OF SIS II OPINION ON THE DEVELOPMENT OF SIS II 1 Introduction In an attempt to ensure that the second-generation Schengen information system SIS II complies with the highest standards of data protection, the Joint

More information