Page 210 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 210

Information  Security and Privacy




                    Notes          The ATM instance explains three categories of security concerns or domains:
                                   1.  Who are you? (Identification, Authentication)
                                   2.  What can you do? (Authorization)
                                   3.  What can you, and others, see? (Privacy)

                                   A fourth domain is less obvious, but it is intertwined with the other three domains:
                                   4.  What happened? (Audit)
                                   The audit domain frequently appears to  be an afterthought in the development of many  IT
                                   applications. Alternatively, in some business areas, like core security, and in applications like
                                   EDI (Electronic Data Interchange), where regulatory issues require important audit capabilities,
                                   the audit function is an explicit and significant security concern. Our method considers auditing
                                   as an implicit intent; thus, the primitives we introduce all imply an audit trail of their detailed
                                   behavior.
                                   So, for example, when we label that party A needs that before it can collaborate with party B, it
                                   must authenticate party B, this shows that authentication request and response with the date/
                                   time in addition  to  other  execution details must  all  be audited.  Figure  14.1 Illustrates  the
                                   Dependencies among these domains.


                                          Example:  It is not possible to execute authorization without authentication. Alternatively
                                   both authorization and authentication rely on auditing, not for execution but to ensure that any
                                   exceptions are captured for analysis and non-repudiation.


                                       !
                                     Caution Privacy depends on both authentication and auditing.
                                                    Figure  14.1: Dependencies  between  Security  Domains












                                   This continues to address  the primitive intents that  are general in these  domains and  then
                                   describes how such primitives, once introduced into a model, can drive executions in any specified
                                   technology.
                                   This domain is mainly related with the identification of one or more parties to a communication
                                   or collaboration. We can in fact divide this into two distinct issues: the static notion of identification
                                   and the dynamic notion of authentication.
                                   In the ATM instance, the ATM card is the static, bank-issued identification, while the card/PIN
                                   pair permits the ATM to authenticate me  dynamically as  the account holder. It  is far more
                                   significant to model the ideas of authentication than identification; usually, identification becomes
                                   much more entwined in the technical details of its execution than does authentication.
                                   So, for example, we can define very simply  that in a specific collaboration between  a set  of
                                   parties there is a need for authentication among those parties. This can be performed explicitly
                                   or implicitly; for example, another idea, that of trust, can be used to illustrate trust zones.




          204                               LOVELY PROFESSIONAL UNIVERSITY
   205   206   207   208   209   210   211   212   213   214   215