A Persona Framework for Attribution, Delegation and Least Privilege

被引:0
|
作者
Chandersekaran, Coimbatore S. [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Delegation; enterprise; information security; least privilege; attribution; information sharing; SECURITY MODEL; RBAC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are many business needs for implementing delegation in IT systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g. by sharing credentials between users), resulting in serious security concerns and a lack of accountability and auditability. This paper describes a proposed framework for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it. This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 50 条
  • [1] A SAML Framework for Attribution, Delegation and Least Privilege
    Chandersekaran, Coimbatore S.
    Simpson, William R.
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 303 - 308
  • [2] Dynamic, context-aware, least-privilege Grid delegation
    Ahsant, Mehran
    Basney, Jim
    Johnsson, Lennart
    2007 8TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2007, : 90 - +
  • [3] Least Privilege across People, Process, and Technology: Endpoint Security Framework
    Plachkinova, Miloslava
    Knapp, Kenneth
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (05) : 1153 - 1165
  • [4] Least privilege and more
    Schneider, FB
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 253 - 258
  • [5] A practical approach of X.509 attribute certificate framework as support to obtain privilege delegation
    Montenegro, JA
    Moya, F
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 160 - 172
  • [6] Least privilege and more
    Cornell University
    不详
    不详
    IEEE Security and Privacy, 2003, 1 (05): : 55 - 59
  • [7] Delegation active certificates: Protocols and privilege management
    Bhoopalam, KP
    Mukkamala, R
    Peddi, PS
    International Conference on Computing, Communications and Control Technologies, Vol 1, Proceedings, 2004, : 57 - 62
  • [8] Least Privilege in Separation Kernels
    Levin, Timothy E.
    Irvine, Cynthia E.
    Nguyen, Thuy D.
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 146 - 157
  • [9] Least privilege in separation kernels
    Levin, Timothy E.
    Irvine, Cynthia E.
    Nguyen, Thuy D.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 355 - +
  • [10] Dynamic delegation using privilege storage in centralized administration
    Jeon, Jun-Cheol
    Kim, Kee-Won
    Yoo, Kee-Young
    International E-Conference on Computer Science 2005, 2005, 2 : 75 - 78