A Persona Framework for Attribution, Delegation and Least Privilege

被引:0
|
作者
Chandersekaran, Coimbatore S. [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Delegation; enterprise; information security; least privilege; attribution; information sharing; SECURITY MODEL; RBAC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are many business needs for implementing delegation in IT systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g. by sharing credentials between users), resulting in serious security concerns and a lack of accountability and auditability. This paper describes a proposed framework for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it. This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 50 条
  • [11] Research of least privilege for database administrators
    Shen, Mou
    Chen, Mengdong
    Li, Min
    Liu, Lianzhong
    International Journal of Database Theory and Application, 2013, 6 (06): : 39 - 50
  • [12] Game to Dethrone: A Least Privilege CTF
    Wu, Wenjing
    Feng, Wu-chang
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 132 - 137
  • [13] Least privilege analysis in software architectures
    Koen Buyens
    Riccardo Scandariato
    Wouter Joosen
    Software & Systems Modeling, 2013, 12 : 331 - 348
  • [14] Least privilege analysis in software architectures
    Buyens, Koen
    Scandariato, Riccardo
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2013, 12 (02): : 331 - 348
  • [15] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [16] Least Privilege Learning for Attribute Obfuscation
    Brown, Glen
    Martinez-del-Rincon, Jesus
    Miller, Paul
    PATTERN RECOGNITION, ACPR 2021, PT II, 2022, 13189 : 142 - 156
  • [17] Stateful Least Privilege Authorization for the Cloud
    Cao, Leo
    Meng, Luoxi
    Stefan, Deian
    Fernandes, Earlence
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3477 - 3494
  • [18] ATTRIBUTE-BASED DELEGATION IN PRIVILEGE MANAGEMENT OF PDM SYSTEM
    Ye, Chunxiao
    Fu, Yunqing
    JOURNAL OF ADVANCED MANUFACTURING SYSTEMS, 2008, 7 (02) : 303 - 306
  • [19] Privilege delegation and agent-oriented access control in Naplet
    Xu, CZ
    Fu, S
    23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, : 493 - 497
  • [20] Enforcing the principle of least privilege with a state-based privilege control model
    Liang, B
    Liu, H
    Shi, WC
    Wu, YJ
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120