80 likes | 218 Vues
The OM-AM framework by Ravi Sandhu at George Mason University's LIST Laboratory presents a comprehensive approach to access control models such as Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC). This model addresses key assurance objectives essential for maintaining data security and integrity. It explores mechanisms to prevent information leakage through defined architectures, including user-role authorization methods. This framework aids in understanding the complexities of implementing these access control paradigms in various environments.
E N D
OM-AM and RBAC Ravi Sandhu* www.list.gmu.edu Laboratory for Information Security Technology (LIST) George Mason University
THE OM-AM WAY A s s u r a n c e Objectives Model Architecture Mechanism What? How?
What? How? OM-AM AND MANDATORY ACCESS CONTROL (MAC) A s s u r a n c e No information leakage Lattices (Bell-LaPadula) Security kernel Security labels
What? How? OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC) A s s u r a n c e Owner-based discretion numerous numerous ACLs, Capabilities, etc
What? How? OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC) A s s u r a n c e Objective neutral RBAC96, ARBAC97, etc. user-pull, server-pull, etc. certificates, tickets, PACs, etc.
Server-Pull Architecture Client Server User-role Authorization Server
User-Pull Architecture Client Server User-role Authorization Server
Proxy-Based Architecture Client Proxy Server Server User-role Authorization Server