|
|
xiii | |
|
|
xv | |
Preface |
|
xix | |
|
1 Access Control, Security, Trust, and Logic |
|
|
1 | (8) |
|
1.1 Deconstructing Access-Control Decisions |
|
|
3 | (3) |
|
1.2 A Logical Approach to Access Control |
|
|
6 | (3) |
|
|
9 | (98) |
|
2 A Language for Access Control |
|
|
11 | (28) |
|
|
11 | (4) |
|
|
12 | (1) |
|
2.1.2 Approaches for Mathematical Proofs |
|
|
13 | (2) |
|
|
15 | (7) |
|
2.2.1 Principal Expressions |
|
|
17 | (1) |
|
2.2.2 Access-Control Statements |
|
|
18 | (2) |
|
2.2.3 Well-Formed Formulas |
|
|
20 | (2) |
|
|
22 | (15) |
|
|
23 | (5) |
|
2.3.2 Semantics of the Logic |
|
|
28 | (9) |
|
|
37 | (1) |
|
|
37 | (2) |
|
3 Reasoning about Access Control |
|
|
39 | (18) |
|
|
39 | (8) |
|
|
41 | (1) |
|
3.1.2 The Modus Ponens Rule |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
3.1.5 The Speaks For Rule |
|
|
43 | (1) |
|
3.1.6 The & Says and Quoting Rules |
|
|
43 | (1) |
|
|
43 | (2) |
|
3.1.8 The Equivalence Rule |
|
|
45 | (1) |
|
3.1.9 The Controls Definition |
|
|
46 | (1) |
|
3.2 Formal Proofs and Theorems |
|
|
47 | (3) |
|
3.3 Soundness of Logical Rules |
|
|
50 | (4) |
|
|
54 | (1) |
|
|
54 | (3) |
|
|
57 | (20) |
|
|
57 | (3) |
|
4.2 Access-Control Mechanisms: Tickets and Lists |
|
|
60 | (8) |
|
|
61 | (2) |
|
|
63 | (3) |
|
4.2.3 Logical and Pragmatic Implications |
|
|
66 | (2) |
|
|
68 | (7) |
|
4.3.1 Two-Factor Authentication |
|
|
68 | (2) |
|
4.3.2 Using Credentials from Other Authorities |
|
|
70 | (4) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (30) |
|
5.1 Confidentiality, Integrity, and Availability |
|
|
77 | (2) |
|
5.2 Discretionary Security Policies |
|
|
79 | (2) |
|
5.3 Mandatory Security Policies |
|
|
81 | (4) |
|
5.4 Military Security Policies |
|
|
85 | (9) |
|
5.4.1 Extending the Logic with Security Levels |
|
|
85 | (2) |
|
5.4.2 Expressing Military Security Policies |
|
|
87 | (3) |
|
5.4.3 Military Security Policies: An Extended Example |
|
|
90 | (4) |
|
|
94 | (11) |
|
5.5.1 Extending the Logic with Integrity Levels |
|
|
95 | (2) |
|
5.5.2 Protecting Integrity |
|
|
97 | (1) |
|
|
98 | (2) |
|
5.5.4 An Extended Example of a Strict Integrity Policy |
|
|
100 | (5) |
|
|
105 | (1) |
|
|
105 | (2) |
|
II Distributed Access Control |
|
|
107 | (68) |
|
|
109 | (24) |
|
6.1 Public-Key Cryptography |
|
|
109 | (3) |
|
6.2 Efficiency Mechanisms |
|
|
112 | (2) |
|
6.2.1 Cryptographic Hash Functions |
|
|
112 | (1) |
|
6.2.2 Data-Encryption Keys |
|
|
113 | (1) |
|
|
113 | (1) |
|
6.3 Reasoning about Cryptographic Communications |
|
|
114 | (2) |
|
6.4 Certificates, Certificate Authorities, and Trust |
|
|
116 | (9) |
|
6.5 Symmetric-Key Cryptography |
|
|
125 | (6) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
133 | (16) |
|
|
133 | (2) |
|
7.2 Delegation and Its Properties |
|
|
135 | (6) |
|
7.3 A Delegation Example: Simple Checking |
|
|
141 | (6) |
|
7.3.1 Formal Definitions of Checks |
|
|
142 | (1) |
|
7.3.2 Bank Policies on Checks |
|
|
143 | (1) |
|
7.3.3 Operating Rules for Checks |
|
|
144 | (3) |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (26) |
|
8.1 SSL and TLS: Authentication across the Web |
|
|
149 | (8) |
|
|
150 | (5) |
|
|
155 | (2) |
|
8.2 Kerberos: Authentication for Distributed Systems |
|
|
157 | (9) |
|
8.2.1 Initial Authentication Requests |
|
|
157 | (2) |
|
8.2.2 Requests for Service-Specific Tickets |
|
|
159 | (2) |
|
8.2.3 Requests for Services |
|
|
161 | (1) |
|
|
162 | (4) |
|
|
166 | (6) |
|
8.3.1 Electronic Clearinghouses |
|
|
166 | (3) |
|
8.3.2 Bank Authorities, Jurisdiction, and Policies |
|
|
169 | (1) |
|
8.3.3 Bank Operating Rules |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (2) |
|
III Isolation and Sharing |
|
|
175 | (86) |
|
9 A Primer on Computer Hardware |
|
|
177 | (20) |
|
|
177 | (1) |
|
|
178 | (12) |
|
9.2.1 Synchronous Registers |
|
|
178 | (1) |
|
9.2.2 Registers with Load Control |
|
|
179 | (1) |
|
9.2.3 Registers with Tri-State Outputs |
|
|
179 | (3) |
|
9.2.4 Combinational Logic and Functions |
|
|
182 | (2) |
|
9.2.5 Arithmetic Logic Units |
|
|
184 | (6) |
|
|
190 | (3) |
|
9.3.1 Data Paths and Control Paths |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (2) |
|
10 Virtual Machines and Memory Protection |
|
|
197 | (30) |
|
|
198 | (6) |
|
10.1.1 Processor Components |
|
|
199 | (2) |
|
10.1.2 Machine Instructions |
|
|
201 | (3) |
|
10.2 Processors with Memory Segmentation |
|
|
204 | (5) |
|
10.2.1 Segmentation Using a Relocation Register |
|
|
204 | (3) |
|
10.2.2 Processor State and Instructions |
|
|
207 | (1) |
|
10.2.3 Program Status Word |
|
|
207 | (1) |
|
|
208 | (1) |
|
10.3 Controlling Access to Memory and Segmentation Registers |
|
|
209 | (8) |
|
10.3.1 Access to Program Memory |
|
|
210 | (2) |
|
10.3.2 Implementation Details |
|
|
212 | (1) |
|
10.3.3 Access to the Relocation Register |
|
|
213 | (2) |
|
10.3.4 Setting the Mode Bit |
|
|
215 | (2) |
|
10.4 Design of the Virtual Machine Monitor |
|
|
217 | (7) |
|
10.4.1 Privileged Instructions |
|
|
220 | (1) |
|
10.4.2 Sensitive Instructions |
|
|
221 | (2) |
|
10.4.3 Virtualizable Processor Architectures |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
11 Access Control Using Descriptors and Capabilities |
|
|
227 | (18) |
|
11.1 Address Descriptors and Capabilities |
|
|
227 | (4) |
|
11.2 Tagged Architectures |
|
|
231 | (2) |
|
|
233 | (8) |
|
|
233 | (2) |
|
11.3.2 Creating New Segments |
|
|
235 | (2) |
|
|
237 | (2) |
|
11.3.4 Revocation of Capabilities |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (3) |
|
12 Access Control Using Lists and Rings |
|
|
245 | (16) |
|
12.1 Generalized Addresses |
|
|
245 | (2) |
|
12.2 Segment Access Controllers |
|
|
247 | (2) |
|
12.3 ACL-Based Access Policy for Memory Accesses |
|
|
249 | (4) |
|
12.4 Ring-Based Access Control |
|
|
253 | (5) |
|
|
254 | (1) |
|
|
255 | (3) |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
261 | (52) |
|
13 Confidentiality and Integrity Policies |
|
|
263 | (26) |
|
13.1 Classifications and Categories |
|
|
263 | (3) |
|
13.2 Bell-La Padula Model, Revisited |
|
|
266 | (3) |
|
13.3 Confidentiality Levels: Some Practical Considerations |
|
|
269 | (3) |
|
13.4 Biba's Strict Integrity, Revisited |
|
|
272 | (4) |
|
13.5 Lipner's Integrity Model |
|
|
276 | (9) |
|
13.5.1 Commercial Integrity Requirements |
|
|
277 | (1) |
|
13.5.2 Commercial Integrity via Bell-La Padula |
|
|
277 | (4) |
|
13.5.3 Commercial Integrity via Bell-La Padula and Strict Integrity |
|
|
281 | (4) |
|
|
285 | (1) |
|
|
285 | (4) |
|
14 Role-Based Access Control |
|
|
289 | (24) |
|
|
289 | (8) |
|
|
290 | (5) |
|
|
295 | (2) |
|
|
297 | (7) |
|
14.2.1 Static Separation of Duty |
|
|
297 | (2) |
|
14.2.2 Dynamic Separation of Duty |
|
|
299 | (5) |
|
14.3 Representing RBAC Systems in the Logic |
|
|
304 | (6) |
|
14.3.1 RBAC Extensions to the Logic |
|
|
304 | (1) |
|
14.3.2 Translating RBAC into the Logic |
|
|
305 | (5) |
|
|
310 | (2) |
|
|
312 | (1) |
|
A Summary of the Access-Control Logic |
|
|
313 | (8) |
|
|
313 | (2) |
|
A.2 Core Rules, Derived Rules, and Extensions |
|
|
315 | (6) |
Bibliography |
|
321 | (3) |
Notation Index |
|
324 | (1) |
General Index |
|
325 | |