A Persona Framework for Attribution, Delegation and Least Privilege

被引:0
|
作者
Chandersekaran, Coimbatore S. [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Delegation; enterprise; information security; least privilege; attribution; information sharing; SECURITY MODEL; RBAC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are many business needs for implementing delegation in IT systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g. by sharing credentials between users), resulting in serious security concerns and a lack of accountability and auditability. This paper describes a proposed framework for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it. This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 50 条
  • [21] Automating Isolation and Least Privilege in Web Services
    Blankstein, Aaron
    Freedman, Michael J.
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 133 - 148
  • [22] A study of least privilege in CapBasED-AMS
    Hung, PCK
    Karlapalem, K
    Gray, JW
    3RD IFCIS INTERNATIONAL CONFERENCE ON COOPERATIVE INFORMATION SYSTEMS - PROCEEDINGS, 1998, : 208 - 217
  • [23] LeMo: Protecting Kernel with Least Privilege Modules
    Zhou, Hongwei
    Yuan, Jinhui
    Zhang, Kai
    Zhu, Xuhua
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 349 - 353
  • [24] Least privilege security in CapBasED-AMS
    Hung, PCK
    Karlapalem, K
    Gray, J
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 1999, 8 (2-3) : 139 - 168
  • [25] Are chrome extensions compliant with the spirit of least privilege?
    Picazo-Sanchez, Pablo
    Ortiz-Martin, Lara
    Schneider, Gerardo
    Sabelfeld, Andrei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1283 - 1297
  • [26] Greedy Algorithm for Least Privilege in RBAC Model
    Liu, Jinling
    Huang, Hejiao
    Du, Hongwei
    COMBINATORIAL OPTIMIZATION AND APPLICATIONS, 2011, 6831 : 537 - 545
  • [27] Satisfying Least Privilege through Database Decomposition
    Baiardi, Fabrizio
    Comella, Cosimo
    Sammartino, Vincenzo
    20TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN 2024, 2024,
  • [28] Mining Least Privilege Roles By Genetic Algorithm
    Dong, Lijun
    Wang, Maocai
    Kang, Xiaojun
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4508 - 4512
  • [29] Are chrome extensions compliant with the spirit of least privilege?
    Pablo Picazo-Sanchez
    Lara Ortiz-Martin
    Gerardo Schneider
    Andrei Sabelfeld
    International Journal of Information Security, 2022, 21 : 1283 - 1297
  • [30] An Authorization Model of Quantitative Analysis of the Least Privilege
    Wang, Hui
    Liu, Lianzhong
    Tian, Wanli
    2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 283 - 288