Compromises and complexities associated with removal of MIS from the logical access authorization loop

ACM-SE 28 Pub Date : 1990-04-01 DOI:10.1145/98949.99031
Harlan D. Webre
{"title":"Compromises and complexities associated with removal of MIS from the logical access authorization loop","authors":"Harlan D. Webre","doi":"10.1145/98949.99031","DOIUrl":null,"url":null,"abstract":"Logical access to computer-housed assets involves the allowance or denial of access requests to entities such as files, database tables, and programs. Although specific control objectives may vary from site to site in the commercial sector, some basic access control objec­ tives can be identified which are nearly universal. These objectives are based strongly upon the notions of asset ownership and authorization. Control of access to computer-housed assets typicnlly follows the same authorization path as the delegation of control of other types of assets, that is, from the board of directors down to some appropriate, workable level. In many installations, however, the responsibility for granting and revoking access to these entities has tra­ ditionally fallen upon the MIS Data Security Officer. This means that either 1) the Security Officer must gain authorization from the proper authority each time an ac­ cess rule is changed, or 2) the Security Officer is the authority for all assets in his or her domain. Neither one of these is a healthy situation. After development of some general access control objectives and an explanation of why the MIS Data Se­ curity Officer bears the mantle of authority, this paper examines the possibility of placing the mechanics of logical access authorization in the hands of the true authority within the appropriate business function. There are two primary obstacles to achieving this end. One is the sheer magnitude of the number of assets under consideration. In an envimoment in which appli­ cations are built and delivered to automate business ac­ tivities, a single application can contain a very large number of assets. The other obstacle is that of identifica­ tion of assets. Often the naming conventions developed and used by the MIS staff have a great deal of meaning to those who are familiar with the workings of the appli­ cation, but will mean little or nothing to someone out­ side MIS. This paper proposes a method of overcoming these obstacles, but the proposal carries with it a substantial price tag. Compromises must be made in the way that com­ puter resources are used and applications are delivered, and a level of complexity is introduced to the access control system which will most probably strain the secu­ rity features available in the target operating system past the limits of their flexibility. The proposal defines an access package, which represents all the operations and atomic accesses neces­ sary to accomplish a particular business activity. The ac­ cess package can be thought of as an access operation raised to a higher level of abstraction. It allows the asset owner to have a business oriented understanding of Ills or her responsibility. However, if a system of access control based on ac­ cess packages can be engineered, it will require that computer users be limited to executing only those access packages to which they have been given access. This is not an attractive thought as the age of end-user comput­ ing arrives. Also, the design of access packages to ac­ complish each application function will have to become a part of the application development process. The complexities encountered in an attempt to de­ sign a specific implementation are explored in this pa­ per. The general control objectives are achieved as well as a logical access authorization loop limited to endusers and asset owners. The latter is based, of course, on the use of access packages. The target computer system is the Digital Equipment Corporation V A X /V M S envi­ ronment. The access control features within the operating system provide some capabilities for defining access packages, but leave a lot to be desired as well. Permission to copy without fee «11 or part of this m«1erin! is granted provided that (he copies are not made or distributed for direct com­ mercial advantage, the ACM copyright notice and the title of five publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific per­ mission.","PeriodicalId":409883,"journal":{"name":"ACM-SE 28","volume":"139 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 28","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/98949.99031","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Logical access to computer-housed assets involves the allowance or denial of access requests to entities such as files, database tables, and programs. Although specific control objectives may vary from site to site in the commercial sector, some basic access control objec­ tives can be identified which are nearly universal. These objectives are based strongly upon the notions of asset ownership and authorization. Control of access to computer-housed assets typicnlly follows the same authorization path as the delegation of control of other types of assets, that is, from the board of directors down to some appropriate, workable level. In many installations, however, the responsibility for granting and revoking access to these entities has tra­ ditionally fallen upon the MIS Data Security Officer. This means that either 1) the Security Officer must gain authorization from the proper authority each time an ac­ cess rule is changed, or 2) the Security Officer is the authority for all assets in his or her domain. Neither one of these is a healthy situation. After development of some general access control objectives and an explanation of why the MIS Data Se­ curity Officer bears the mantle of authority, this paper examines the possibility of placing the mechanics of logical access authorization in the hands of the true authority within the appropriate business function. There are two primary obstacles to achieving this end. One is the sheer magnitude of the number of assets under consideration. In an envimoment in which appli­ cations are built and delivered to automate business ac­ tivities, a single application can contain a very large number of assets. The other obstacle is that of identifica­ tion of assets. Often the naming conventions developed and used by the MIS staff have a great deal of meaning to those who are familiar with the workings of the appli­ cation, but will mean little or nothing to someone out­ side MIS. This paper proposes a method of overcoming these obstacles, but the proposal carries with it a substantial price tag. Compromises must be made in the way that com­ puter resources are used and applications are delivered, and a level of complexity is introduced to the access control system which will most probably strain the secu­ rity features available in the target operating system past the limits of their flexibility. The proposal defines an access package, which represents all the operations and atomic accesses neces­ sary to accomplish a particular business activity. The ac­ cess package can be thought of as an access operation raised to a higher level of abstraction. It allows the asset owner to have a business oriented understanding of Ills or her responsibility. However, if a system of access control based on ac­ cess packages can be engineered, it will require that computer users be limited to executing only those access packages to which they have been given access. This is not an attractive thought as the age of end-user comput­ ing arrives. Also, the design of access packages to ac­ complish each application function will have to become a part of the application development process. The complexities encountered in an attempt to de­ sign a specific implementation are explored in this pa­ per. The general control objectives are achieved as well as a logical access authorization loop limited to endusers and asset owners. The latter is based, of course, on the use of access packages. The target computer system is the Digital Equipment Corporation V A X /V M S envi­ ronment. The access control features within the operating system provide some capabilities for defining access packages, but leave a lot to be desired as well. Permission to copy without fee «11 or part of this m«1erin! is granted provided that (he copies are not made or distributed for direct com­ mercial advantage, the ACM copyright notice and the title of five publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific per­ mission.
与从逻辑访问授权循环中删除MIS相关的危害和复杂性
对计算机资产的逻辑访问涉及允许或拒绝对文件、数据库表和程序等实体的访问请求。虽然在商业领域,具体的控制目标可能因地点而异,但可以确定一些基本的访问控制目标,这些目标几乎是通用的。这些目标强烈地基于资产所有权和授权的概念。对计算机资产的访问控制通常遵循与对其他类型资产的控制授权相同的授权路径,即从董事会到适当的、可操作的级别。然而,在许多设施中,授予和撤销对这些实体的访问权的责任传统上落在MIS数据安全官员身上。这意味着,要么1)每次更改访问规则时,安全官员必须从适当的机构获得授权,要么2)安全官员是其域内所有资产的权威。这两种情况都不健康。在开发了一些通用的访问控制目标并解释了为什么MIS数据安全官肩负着权威的重任之后,本文研究了将逻辑访问授权机制置于适当业务功能中的真正权威手中的可能性。实现这一目标有两个主要障碍。其一是考虑中的资产数量庞大。在构建和交付应用程序以实现业务活动自动化的环境中,单个应用程序可以包含非常大量的资产。另一个障碍是资产的识别。通常,由MIS工作人员开发和使用的命名约定对于熟悉应用程序工作原理的人来说意义重大,但对于MIS以外的人来说意义不大或毫无意义。本文提出了一种克服这些障碍的方法,但该建议附带了大量的价格标签。必须在使用计算机资源和交付应用程序的方式上作出妥协,并且在访问控制系统中引入一定程度的复杂性,这很可能会使目标操作系统中可用的安全特性超出其灵活性的极限。提案定义了一个访问包,它表示完成特定业务活动所需的所有操作和原子访问。访问包可以看作是一个提升到更高抽象层次的访问操作。它使资产所有者能够以业务为导向理解其责任。然而,如果一个基于访问包的访问控制系统能够被设计出来,它将要求计算机用户被限制只执行那些他们被授予访问权限的访问包。随着终端用户计算时代的到来,这不是一个有吸引力的想法。此外,访问包的设计来完成每个应用程序的功能将不得不成为应用程序开发过程的一部分。本文探讨了在尝试设计特定实现时所遇到的复杂性。实现了一般控制目标,并实现了仅限终端用户和资产所有者的逻辑访问授权循环。当然,后者是基于访问包的使用。目标计算机系统是数字设备公司的vax / vms环境。操作系统中的访问控制特性为定义访问包提供了一些功能,但是还有很多需要改进的地方。允许免费复制本文件的一部分或部分内容。在下述条件下,即该副本不是为直接商业利益而制作或分发的,必须出现美国计算机协会版权声明、五份出版物的标题和出版日期,并注明复制是由美国计算机协会许可的。以其他方式复制,或重新发布,需要费用和/或特定的任务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信