Single Sign-On User Single Sign-On Identification and Shell Authentication Credentials Password Token Authentication Authentication Authentication Application Application A pplication From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Single Sign-On 11 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
12 Access Control Policy Who+ what+How= Yes/No Obiect Mode of access (what) Subject (how) (who) N From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Access Control 12 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
Access Policies Goals Check every access Enforce least privilege Verify acceptable usage Track users' access Enforce at appropriate granularity Use audit logging to track accesses From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Access Policies • Goals: • Check every access • Enforce least privilege • Verify acceptable usage • Track users’ access • Enforce at appropriate granularity • Use audit logging to track accesses 13 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
Implementing Access Control Reference monitor Access control directory Access control matrix Access control list Privilege list Capability Procedure-oriented access control Role-based access control From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Implementing Access Control • Reference monitor • Access control directory • Access control matrix • Access control list • Privilege list • Capability • Procedure-oriented access control • Role-based access control 14 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved