Home
User Manual for ABAC Policy Administration Point - KTH
Contents
1. National ICT R amp D Fund 4 The Create Action interface is opened to add the required number of Actions This interface further has three main portions to add the Action its Attributes and Attribute Values as highlighted with a b and c in figure below Create Action Action Mame Action Description Action Attributes Action Attribute Values No records found No records found Add Attribute Value a 1 The first portion of the interface consists of Action Name and Action Description text boxes Add the required name and description in text boxes as shown below Action Name Student Action Actions that can be performed by the Students Action Description b 1 The second portion of the Create Action interface provides the Add Attribute button to add the required Attributes to the Action Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Action Attributes Mo records found b 2 The following interface is opened to add the required Action Attributes It consists of Attribute Name Data Type and Attribute Value text boxes Enter the required Attribute name its Value and select the data type from the given list Finally click on the Save button as shown below y
2. records found is displayed XACML Policy Generatio No records found Description Generate XACML Policy Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund XACML Policy Set Generation Generate XACML Policy Set 3 All the policies and PolicySet we will be generated in the D drive Right now we have not generated policies or PolicySet therefore the drive D is not showing any of it Share View Manage Ga gt ThisPC Local Disk D Y Favorites Pame El Desktop de Downloads Recent places Type Lo KTH SEECS AIS LAB de Manual di Research Work 2 1 2014 4 55 AM File folder 2 14 2014 11 15AM File folder 2 14 2014 4 34 PM File folder 22 Homegroup jm This PC de Desktop E Documents de Downloads ID Music E Pictures B Videos i Local Disk C a Local Disk D a Local Disk E Cu Network 3 items ration button XACML Policy Set Generation Policy Set No records found Generate XACML Policy Set Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp
3. Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project 330 Ae CY National ICT R amp D Fund 4 Z sus EN 5 NS 2 Ay Mo e AN a U A rs pS y te ts x E ya ETS E A 4 Ker a MT 2 Update Target 1 In order to update any existing Target parameter right click on that specific Target and choose Update from the drop down menu Target Description Server Deletion to delete data from Server Update Target Accessing LMS to access LMS Delete Available Subjects Available Resources Available Actions Available Environments string equal PHD string equal BESE 1 string equal Delete No records found string equal BESE 2 string equal Delete string equal PDF string equal Delete string equal Word Documents Add Target 2 In the Update Target interface edit any of the previously added Target attributefand click Update to save the changes into the database Update Target Target Name Server Deletion Target able to delete data from LMS Server ome o mes Target Description N Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website
4. ais seecs nust edu pk project National ICT R amp D Fund c 4 After saving the Attribute Value the following two values are visible under the Action Attribute Values tab as shown in below figure Action Attribute Values Add Attribute Value 5 Now click on the Save button in the Create Action interface to save in database as shown below Create Action Action Name Student Action Enter the action name here Actions that can be performed by Action Description pan Action Attributes Action Attribute Values Action on Server Add Attribute Value gt Save Cancel 6 The added Action is displayed on Action interface with its values under the Agtion Name and Action Description tabs as shown in below figure Action Name Action Description Student Action Actions that can be performed by the Students j Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 7 Now click on the newly added line of Action it displays the Attributes of that Action under the Action Attribute tab as well as the sign is also enabled to add more Attributes for the selected Action Action Description Student Action Actions that can be performed by
5. 4 items al TestPolicy_3 9 01_D14Feb147T07 35 18 xml 2 14 2014 7 35 PM AML File PG 2 Policy Set Generation 1 For generation of the Policy Set click on the Policy Set Generation butt n under the XACML Generation tab XACML Policy Set Generation Policy Set Description No records found Generate XACML Policy Set 2 To generate the XACML based policy set first click on a specific policy set and 1t will be highlighted Next click on Generate XACML Policy Set button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund XACML Policy Set Generation Policy Set Description Test policyset A test policyset where target is able to access the LMS MTY 3 A dialog box will pop up showing the policy set has been generated 7 7 1 7 Test policyset successfully generated Description Test policyset A test policyset where target is able to access the LMS XACML Policy Set Generation Generate XACML Policy Set 4 In the following figure we can see that a PolicySet file is also created in our D drive To i Drive Tools Local Disk D Home Share View Manage SN Ee Search Local Disk D Y clas Name Date modified Type E Desktop de KTH SEECS AIS LAB 2
6. Actions that can be performed by Staff Action on Server No records found Actions that can be performed by Students gt al Actions on LMS Actions that can be performed by Faculty Actions that can be performed by Staff Must Be Present Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 2 Click on any of the Action Attribute from the available list to view its values As a result a complete list of possible values is displayed under Action Attribute Values tab select any particular value and click Next Add New Action Action Value Match Id Description Action Attributes Action Attribute Values Action on Server Log in Actions that can be performed by Students Read Actions that can be performed by Faculty Write Delete Actions that can be performed by Staff LJ Must Be Present Cancel gt Next f c 3 In the Match Id tab list of possible match ids for the previously selected Action Value is presented Select any match Id value from the available list and click Save to hdd the dlick on selection Action Value and Match Id against the individual Target Whereas Back button will take you back to the Action Value interface and Cancel will discard all the sel
7. Add Action Attribute 1 Attribute Marne Action on Server String a Data Type Integer Boolean le b 3 The added Attribute is displayed under the Action Attribute tab as shown in below figure Action Attributes Action Attribute Values Action on Sever lt No records found Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 1 The third part of the Create Action interface consists of the Add Attribute Value button to add more than one value for specific Attribute It is compulsory to select the required Attribute from the Action Attributes before adding the values If the Add Attribute Value button is clicked without selecting any Attribute a warning message is popped out to first select the Attribute Action Attributes Action Attribute Values Action on Server Add Attribute Value c 2 Click on the Add Attribute Value button to add a new value for the Attribute of Action Action Attribute Values Add Action Attribute Value Attribute Value Write Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http
8. Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund o records found Action Attribute Value No records found No records found _ E _ E b The second portion of this interface contains the Aeti n Attributes tab that enlists the added Attributes for a given Action Initially when there are no records in the database the button is disabled Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Action Attributes Mo records found f c The third part of the interface consists of Action Attribute Values tab that gives a list of different values for a specific Attribute When there is no Action added the sign is disabled i Action Attribute Value No records found lt 3 Click on the Add Action button on the bottom right corner of the below interface No records found Action Attributes Action Attribute Value No records found No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project
9. parameters is displayed on the Policy interface Rule Combining Algorithm Applicable Targets Accessing LMS Permit overrides Target able to access LMS Policy for accessing resources on LMS LMS Data Access Deny overrides Target able to access LMS Policy for accessing the files and data on server Applicable Rules No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund PC 4 Manage Policy Set In order to add update and delete Policy Set and its related parameters including Target Rule and Policy select Policy Set from the main Policy Creation dropdown menu Policy Creation Policy Set MPS 1 Create Policy Set 1 Below is the main Policy Set interface which is used to add update and delete Policy Set and its related parameters PolicySet PolicySet No records found Applicable Policy Sets Applicable Policies No records found No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 Click on Add Policy Set button to a
10. 6 The added Resource is displayed on Resource interface with its values under the Resource Name and Resource Description tabs as shown in below figure Resource Resource Description Student Sharing Center f 7 Click on the new added line of Resource it displays the Attributes of the Resource under the Resource Attribute tab as well as the sign is also enabled to add more Attributes for the selected Resource Resource Resource Name Resource Description SSC Student Sharing Center Resource Attributes Resource Attributes Value Lectures i No records found 8 In order to add more Resource Attributes click on the button asrsShown below Resource Attributes Lectures Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 9 Add the required values for Attribute Name Data Type and Attribute Value and then click on Save button Add Resource Attribute Attribute Name Student Documents String Data Type Integer Boolean Attribute Value 1 10 Now two different Resource Attributes are visible under the Resource Attribute tab 4s shown in figure below j Resource Attributes Resource Attributes Value Lectures E No records found Student Documents 11 In o
11. Combining Algorithm Applicable Targets Description No records found Applicable Rules No records found N AddPoliy 3 In the Create Policy interface specify Policy Name Description Rule combining Algorithm along with the desired Target parameter and their corresponding Rules Click on Save to insert the new Policy parameter into the database and Cancel to dis ard the added information Create Policy Create Policy Name LMS Data Access Policy for accessing the files and TRF data on server Description Rule Combining Algorithm Deny overrides z Available Target Available Rules Target able to delete data from Server Data Deletion Target able to access LMS Accessing LMS N Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 4 After the successful creation of Policy its Name Description Rule Combining Algorithm and Applicable Target is shown in the Policy interface Selecting any Policy from the available list enables the add update option for Applicable Rules Policy Policy Rule Combining Algorithm Applicable Targets Description i 3 Target able to delete data from SSC Data Deletion Deny Override oe Policy for Deleting Data
12. Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Subject Subject Name Faculty Access Subject Subject of the faculty Subject Attributes Subject Attribute Values Education 4 No records found 8 In order to add more Subject Attributes click on the button as shown below y Subject Attributes Education 9 Add the required values for Attribute Name Data Type and Attribute Value and titen click on Save button Add Subject Attribute Attribute Name Experience String Data Type Integer Boolean Attribute Value 5 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 10 Now two Subject Attributes are visible under the Subject Attribute tab as shown below Subject Attributes Subject Attribute Values Education No records found Experience 11 In order to view the values for specific Attributes click on the required Attribute It enables the button as shown below By clicking on button more Attribute Values can be added to the selected Attribute k a Subject Attributes Subject Attribute Values Education Experience MS 2 Update Subject 1 Right click
13. as depicted in below figure E Add Subject Attribute Value Attribute Value MIS c 4 After saving the Attribute Value the following two values are visible under the Subject Attribute Values tab as shown in below figure Subject Attribute Values Add Attribute Value 5 Now click on the Save button in the Create Subject interface to save the added Subject in database Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Create Subject Subject Name Faculty Subject of the Faculty Subject Description Subject Category Access Subject Subject Attribute Values Education Add Attribute Value s 6 The added Subject is displayed on Subject interface with different values under the Subject Name Subject Category and Subject Description tabs as given below Subject Subject Name Subject Category Subject Description Access Subject Subject of the faculty 7 Now click on the newly added line of Subject it gives the Attrbutes of the Subject under the Subject Attribute tab as well asthe sign is enabledtd add more Attributes for the selected Subject Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12
14. http ais seecs nust edu pk project National ICT R amp D Fund 3 After the successful execution of update function Target interface displays the list of updated Target parameters Server Deletion Target able to delete data from LMS Server Accessing LMS Target able to access LMS Available Subjects Available Resources Available Actions Available Environments string equal PHD string equal BESE 1 string equal Delete No records found string equal BESE 2 string equal Delete string equal PDF string equal Delete string equal Word Documents Add Target MT 3 Delete Target 1 In order to Delete any of the existing Target right click on that particular Target and select Delete from the menu Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT Y R amp D Func Target Description Server Deletion data from LMS Server Update Target Accessing LMS Available Subjects Available Resources Available Actions Available Environments string equal PHD string equal BESE 1 string equal Delete No records found string equal BESE 2 string equal Delete string equal PDF string equal Delete string equal Word Documents Add Target 2 After the successful deletion of selected Target updated list of available Target
15. on Server Accessing LMS Deny Override Target able to access LMS Policy for accessing resources on LMS LMS Data Access Deny overrides Target able to access LMS Policy for accessing the files and data on server Applicable Rules No records found Add Policy 5 Click on option to add Available Rules to the selected Policy In the Add Polity Rule interface Check select the Rule description that you want to add to the selected Policy and click Add to save the association in the database and Cancel to exit the interface Add Policy Rule Available Rules Rule for deleting data on Database Server Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 6 If saved newly added Applicable Rules appear in the main Policy interface against the selected Policy Policy Policy Rule Combining Algorithm Applicable Targets Description Accessing LMS Permit overrides Target able to access LMS Policy for accessing resources on LMS LMS Data Access Deny overrides Target able to access LMS Policy for accessing the files and data on server Applicable Rules Rule for deleting data on Database Server Rule for accessing LMSnull Add Policy MP 2 Update Policy l In order to update any of the
16. the available list and click Save to hdd the selection Subject Value and Match Id against the individual Target Whereas lick on Back button will take you back to the Subject Value interface and Cancel will discard all the selections and return to the main Target interface Add New Subject Subject Value MatchId string equal string bag Match Ids string bag size string is in string one and only np pr e Back Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund b 1 Click on option to add update Available Resource against the selected Target parameter In the Resource Value tab select Resource Description from the available list As a result of this selection list of available Resource Attributes is displayed Add New Resource Resource Value Match Id Description Resource Attributes Resource Attribute Values Learning Management System E No records found Student Sharing Center Grading Panel LJ Must Be Present Cancel gt Next b 2 Click on any of the Resource Attribute from the available list to view its values As a result a complete list of possible values is displayed under Resource Attribute Values tab sel
17. 1 2014 4 55 AM File folder Jp Downloads Le Manual 2 14 2014 11 15AM _ File folder El Recent places pa Research Work 2 14 2014 4 34 PM File folder c DO Ey OS LA gt as D TASIOLA 7 25 DA Homegroup a Test policyset_D14Feb14T07 36 36 xml 2 15 2014 8 27PM XML File E This PC de Desktop E Documents B Downloads de Music E Pictures BB Videos ls Local Disk C Ga Local Disk D Ga Local Disk E Cu Network A Test policyset_ aiaiai 36 36 xml zl 342014 amp 27 PM XML File PP KTH SEECS Applied eon Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project
18. Attribute is deleted along with all of its Attribute Values as shown in below figure Resource Attributes Value No records found lt a To delete a particular Attribute Value right click on that value under the Resource Attribute Value tab and click on the Delete option Resource Attributes Value BESE 3 BESE 1 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT E oS E R amp D Fund RU 6 The selected Attribute value 1s deleted as shown in below figure Resource Attributes Value BESEZ SL 3 Manage Action This section demonstrates how to create update and delete the Action parameter in System Learning 1 phase s MA 1 Create Action y 1 In order to create Action select the Action option from dropdown list as depicted below System Learning Subject Resource Environment 2 After selecting the Action option in previous step the following Action interface is opened This interface further incl des three main portions as highlighted with a f b and c in the below figure a Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164
19. D Fund 5 In our scenario a TestPolicy_3_9 01 is present in our database XACML Policy Generation Description Generate XACML Policy 1 6 Select a specific Policy and click on Generate XACML Policy button to generale XACML based Policy XACML Policy Generation TestPolicy 3 9 01 Test Policy Generate XACML Policy 7 A dialog box will pop up showing the Policy has been generated TestPolicy 3 9 01 successfully generated Description XACML Policy Generation TestPolicy_3_9 01 Test Policy Generate XACML Policy Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 8 In the following figure we can see that our D drive has a TestPolicy file Home Share View Manage Y gt ThisPC Local Disk D 49 Favorites Name Date modified HE Desktop Le KTH SEECS AIS LAB 2 1 20144 55AM File folder i Downloads Le Manual 2 14 2014 11 15AM _ File folder Recent places l PAPA e as tl 3 TestPolicy_3_9 01_D14Feb14T05 05 13 xml 2 14 2014 5 05 PM XML File 8 Homegroup a Mi This PC de Desktop gt E Documents de Downloads D Music Pictures gt BB Videos ly Local Disk C gt a Local Disk D gt Ea Local Disk E gt Cu Network
20. Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 7 Now click on the newly added line of Environment it displays the Attributes of that Environment under the Environment Attribute tab as well as the sign is also enabled to add more Attributes for the selected Environment Environment Faculty Environment Environment attributes for the faculty Environment Attributes Environment Attribute Value timings No records found j 8 In order to add more Environment Attributes click on the button as shown below Environment Attributes timings 9 Add the required values for Attribute Name Data Type and Attrrbute Value and then click on Save button a Add Environment Attribute Attribute Name IP String Data Type Integer Boolean Attribute Value 121 74 15 1 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 10 Now two different Environment Attributes are visible under the Environment Attribute tab as shown in figure below Environment Attributes timings IP 1 4 11 In order to view the values for specific Attributes click on
21. National ICT R amp D Fund Extensible Access Control Framework for Cloud based Applications User Manual for y i ABAC b Policy Administration Point 19 02 2014 Version 1 0 Dr Muhammad Awais Shibli Principal Investigator Dr Arshad Ali Co Principat Investigator National ICTR amp D Funding Organization Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Contents TAME CWC EON ata sce tance NO De e e one sosesededataseunneetce T 3 e o E ates saguper eabougosedsaenerect aestes 3 Document Convento asta ea 3 AA E o A ee 4 Suse Ma ace UD oy br od ise 4 SL 2 Manage Resource s miia Bg oe 18 SL 3 Manage A aE ae on 31 SL 4 Manage EnNVIrONMEDt oooonnnncnnnnncnnnnnncnnnnnnnnnnnanoconnnnnoninonos esas 44 B Policy Greationg E cece os A nace 58 PC 1 4 Mandate Ta a A E ee a A accion 58 PC 2 Panas ula cee lll 0 TO o y PETEA 70 PCHS SEMA ae AA MAA A ee S T a Specs 76 P 4am Manage Policy Seta E E f eee 82 C A Poli y Genio E a MN Se 89 PGS 4 P licy Generation 98 1 T ss ol 89 PG6 24 Policy Set Gemeration S L esaa E O I 92 Extensible Access Control Framework for Cloud based Applications K
22. Read Write 6 The selected Attribute value is deleted as shown in below figure Action Attribute Value SL 4 Manage Environment In this section we demonstrate how to create update and delete the Environment parameter in System Learning phase ME 1 Create Environment 1 In order to create Environment select the Environment optiomftom dropdown list as depicted below System Learning Subject Resource Action Environment Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 After selecting the Environment option in previous step the following Environment interface is opened This interface further includes three main portions as highlighted with a b and c in the below figure Environment Name Environment Description No records found Environment Attributes No records found No records found Add Environment a The upper portion of the Environment interface contains Environment Name and Environment Description tabs Initially when no Environment is added in the database No records found is displayed Environment Environment Name Environment Description No records found lt b The second portio
23. TH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Introduction The purpose of this document is to provide User Manual of Policy Administration Point for Attribute Based Access Control model for the project entitled Extensible Access Control Framework for Cloud Based Applications This project broadly aims to provide Access Control as a Service ACaaS for Software as a Service SaaS layer applications It incorporates variety of reliable and well known access control models as Cloud based services These access control models mainly include Attribute Based Access Control ABAC Fine Grained Access Control FGAC and Usage based access CONtrol UCON models Each of these models is intended to facilitate the service consumers to secure their applications at SaaS layer where the management and evaluation of access control decisions is externalized and handled for Cloud consumers The major components of the framework include Policy Decision Point PDP Policy Enforcement Point PEP and Policy Administrator Point PAP All of these components are designed to perform some specific functionality for instance PAP deals with the management of access control policy whereas PDP is responsible for the formulation of authorization decision by evaluating access control policy However PEP acts as a se
24. TH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund a 1 The first portion of the interface consists of Subject Name Subject Description and Subject Category text box In order to create a Subject add the required name and description in text boxes The required category can be selected from the dropdown list as shown below Subject Name Faculty This is a faculty member at university Subject Description fo Subject Category Select Category Ka Select Category Access Subject Me Code Base i Intermediary Subject j Recipient Subject Requesting Machine l a b 1 The second part of the Create Subject interface provides the Add Attribute button to add the required attributes for a particular subject Subject Attributes Mo records found a Add Attribute b 2 The following ieee appears_to_add_the required subject attributes It consists of Attribute Name Data Type and Attribute Value text boxes Enter the required attribute name its value and select the data type from the given list Click on the Save button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project Nati
25. anagement Rule for deleting data on Server Update System Add Rule 2 After the successful deletion of selected Rule updated list of available Rule parameters is displayed on the Rule interface Applicable Targets Description Target that allows Faculty to access Learning Management Rule for accessing Learning Management System System Add Rule Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund PC 3 Manage Policy In order to add update and delete Policy and its related parameters including Target and Rule select Policy from the main Policy Creation dropdown menu Policy Creation Target Rule Policy Set MP 1 Create Policy 1 1 Below is the main Policy interface which is used to add update and delete Policy and its related parameters Policy Policy No records found Applicable Rules No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 Click on Add Policy button to add new Policy parameter into the database Policy Policy Rule
26. based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Environment Attributes Environment Attribute Value No records found lt No records found lt 5 To delete a particular Attribute Value click on that value under the Environment Attribute Value tab and click on the Delete option k Environment Attribute Value g 15 Delete Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund NOCIVA B Policy Creation In this section we demonstrate the procedure to perform add update and delete operations on the Target Rule Policy and Policy Set parameters in the Policy Creation phase Select Policy Creation option form the main interface of policy administration point 7 4 Click on Policy Creation will display its associated options that are Target Rule Policy and Policy Set Accordingly the four main subsections include Manage Target Manage Rule Manage Policy and Manage Policy Set PC 1 Manage Target Select Target option from the main Policy Creation dropdown menu to add update and delete Targets and its re
27. cords found No records found No records found a 1 Click on option to add update Available Subjects against the selected Target parameter In the Subject Value tab select Subject Description from the available list As a result of this selection list of available Subject Attributes is displayed Add New Subject x Subject Value Match Id Description Subject Attributes Subject Attribute Values A Education No records found Subject for the Staff Experience Subject for the faculty Subject for the Student LJ Must Be Present Cancel Next Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund a 2 Click on any of the Subject Attribute from the available list to view its values As a result a complete list of possible values is displayed under Subject Attribute Values tab select any particular value and click Next Add New Subject Subject Value Match Id Description Subject Attributes Subject Attribute Values Subject for the Student Education 5 years Subject for the faculty Must Be Present Cancel gt Next a 3 In the Match Id tab list of possible match Ids for the previously selected Subject value is presented Select any match Id value from
28. cting any Policy Set from the available list enables the add update option for Applicable Policy Sets and Applicable Policies PolicySet Target that allows Faculty to access Learning Management Policy Set for Delete Permission on Server System SSC Data Deletion Permit overrides Applicable Policy Sets Applicable Policies No records found Policy for Deleting Data on Server Add PolicySet a Click on option to update the Applicable Policy Set attribute against ay selected Policy Set Update Sub PolicySets Policy Sets No records found gt Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund b Click on option to update the Applicable Policy attribute against any selected Policy Set Update Sub Policy Set Policies No records found 5 If saved successfully newly added Policy Set with Applicable Policies will be displayed in the main Policy Set interface against the selected Policy Set PolicySet Policy Combining Algorithm Applicable Targets Description SSC Data Deletion Permit overrides Target able to access LMS Policy that allows Faculty to delete data from LMS Applicable Policy Sets Applicable Policies No records found Policy for acces
29. ctor Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project PolicySet SSC Access Policy Applicable Policy Sets No records found MPS 3 PolicySet SSC Access Policy SSC Data Deletion Applicable Policy Sets No records found National ICT R amp D Fund 3 After the successful execution of update function Policy Set interface displays the list of updated Policy Set parameters Policy Combining Algorithm Permit overrides Delete Policy Set Server Policy Combining Algorithm Applicable Targets Target that allows Faculty to access Learning Management System Applicable Policies Policy for Deleting Data on Server Applicable Targets Target that allows Faculty to Permit overrides Permit overrides 5s Learning Management Jet that allows Faculty to access Learning Management System Applicable Policies Policy for Deleting Data on Server Description Policy Set for Access Permission on Server Add PolicySet To Delete any of the existing Policy Set right click on the PolicySet to be del ted and select Delete from the menu As a result selected Policy Set is deleted from the database Description Policy Set for Access Permission on Server Policy Set for Access Permission on Server Add PolicySet Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Informa
30. curity Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT Lee E R amp D Fund NU A 2 After selecting the Subject option in previous step the following appears to add the new Subjects This interface further includes three main portions as highlighted with a b and c in the below figure Subject Subject Name Subject Category Subject Description No records found Subject Attributes Subject Attribute Values No records found No records found Add Subject a The upper portion of the Subject interface contains Subject Name Subject Category and Subject Description tabs If there are no Subjects in the database No records found appears Subject These are the available subjects Subject Category Subject Name Subject Description No records found j Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund b The second portion of this interface contains the Subject Attributes tab that enlists the added attributes for a given Subject Initially there are no records in the database and the button is also disabled These are the available subject att
31. curity Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Update Action Attribute Attribute Mame Server Action 6 The updated results for the particular Attribute appears under theAction Attribute tab on main Action interface E Action Attributes Action on LMS Similarly the values for Attribute can also be updated Right click on the name of the Attribute Value under Action Attribute Value tab Now select the Update option from the menu Action Attribute Value Write Update Read Delete 8 The following window is displayed Enter the new required value for Attribute and then click on Save button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Update Action Attribute Value Attribute Value Delete 9 The updated value for the Action attribute is displayed instead of the previous value as shown below gt Action Attribute Value MA 3 Delete Action 1 To delete a particular Action click on the name of that Action in main Action interfade Select the Delete option from the dropdown list Action Description Faculy Action Actions that can be performed by
32. dd new Policy Set parameter into the database PolicySet Policy Combining Algorithm Applicable Targets Description No records found Applicable Policy Sets n Applicable Policies No records found No records found Add PolicySet 3 In the Add New Policy Set interface specify PolicySet Name Description Policy Combining Algorithm along with the applicable Target It provides the provision to add applicable Policies and Policy Sets into the newly created Policy Set Click Save to insert the new Policy Set parameter into the database and Cancel to discard tha added information Add New Policy Set Policy Set PolicySet Name SSC Data Deletion Policy Set for Delete Permission on mee Server Description Policy Combining Algorithm Permit overrides oe Applicable Target Applicable Policy Sets Applicable Policies Target that allows Faculty to access SSC Data Deletion Accessing LMS Learning Management System SSC Data Deletion Cancel Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 4 After the successful creation of PolicySet newly added Policy Set with all of its related attributes will be displayed in the main PolicySet interface Sele
33. e Resource Attribute Value Attribute Value BESE 3 9 The updated value for the Resource Attribute is displayed instead of the previous value fs shown below Resource Attributes Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MR 3 Delete Resource l Right click on the name of that Resource in main Resource interface Select the Delete option from the dropdown list 2 The selected Resource is deleted as shown in below figure The Resource Attributes and Resource Attribute Values are also deleted for that specific Resource Resource No records found E Resource Attributes No records found Resource Attributes Value No records found lt Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 3 In order to delete an Attribute of particular Resource right click on that Attribute under Resource Attribute tab on the main Resource interface Click on the Delete option from the dropdown list Resource Attributes Lectures Documents 4 The selected
34. e required number of Environments This interface further has three main portions to add the Environment its Attributes and Attribute values as highlighted with a b and c in figure below Create Environment Create Environment Environment Name Environment Description Environment Attributes Environment Attribute Values No records found No records found b Add Attribute Value a 1 The first portion of the interface consists of Environment Name and Environment Description text boxes In order to create an Environment add the requiredyname and description in text boxes as shown below Environment Mame Faculty Environment Environment Attributes for the faculty Environment Description b 1 The second part of the Create Environment interface provides the Add Attribute button to add the required Attributes to the added Environment in previous step Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Environment Attributes Mo records found f b 2 The following interface is opened to add the required Environment Attributes It consists of Attribute Name Data Type and Attribute Value text boxes Erter the required Attribute name its
35. ebsite http ais seecs nust edu pk project National ICT R amp D Fund 3 Click on Add Target button to add new Target parameter into the database Target Description No records found Available Subjects Available Resources Available Actions Available Environments No records found No records found No records found No records found 4 In the New Target interface specify Target name add its description and click Save to insert the new Target parameter into the database and Cancel to discard thg added information New Target Target Name Access LMS Faculty to access Learning Target Description Management system mee Come Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 5 Upon successful creation of Target its name and description appears in the main Target interface Selecting any Target from the available list enables the add update option for Available Subjects Available Resources Available Actions and Available Environments Target Description Access LMS Target that allows Faculty to access Learning Management System Available Subjects Available Resources b Available Actions C Available Environments d No records found No re
36. ect National ICT R amp D Fund 5 Update Subject Attribute interface displays on the screen Enter the required name in the Attribute Name text box and click on Save button Update Subject Attribute Attribute Mame Education 6 Similarly the values for Attribute can also be updated Right click on the name of the Attribute Value under Subject Attribute Value tab Now select the Update option from the dropdown list 4 Subject Attribute Values PHD MIS 7 The following window appears Enter the new required value for Attribute and then click on Save button Update Subject Attribute Value Attribute Value PHD MS 3 Delete Subject 1 Right click on the name of Subject in main Subject interface Select the Delete option from the dropdown list Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Subject Name j Subject Description ecipient Subject Subject of the faculty Update Delete 2 The selected Subject is deleted as shown in below D The Subject Attributes and Subject Attribute Values are also deleted for that specific Subject Subject Subject Name No records found lt Subject Attributes Subject Attribute Values No records found lt No reco
37. ect any particular value and click Next Add New Resource Resource Value Match Id Description Resource Attributes Resource Attribute Values Student Sharing Center Grading Panel Assignments LJ Must Be Present Cancel gt Net f Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund b 3 In the Match Id tab list of possible match ids for the previously selected Resource value is presented Select any match Id value from the available list and click Save to add the selection Resource Value and Match Id against the individual Target Whereas click on Back button will take you back to the Resource Value interface and Cancel will discard all the selections and return to the main Target interface Add New Resource Resource Value Match Id string equal string bag string bag size string is in string one and only c 1 Click on option to add update Available Action against the selected Target pafameter In the Action Value tab select action Description from the available list As a result of this selection list of available Action Attributes is displayed Add New Action Action Value Match Id Description Action Attributes Action Attribute Values
38. ections and return to the main Target interface Add New Action Action Value Match Id string equal string bag Match Ids string bag size string is in string one and only 4 e Back Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund d 1 Click on option to add update Available Environment against the selected Target parameter In the Environment Value tab select Environment Description from the available list As a result of this selection list of available Environment Attributes is displayed Add New Environment Environment Value Match Id Description Environment Attributes Environment Attribute Values Environment Attributes for the Staff Timings No records found Environment Attributes for the Students LJ Must Be Present Cancel Next d 2 Click on any of the Environment Attribute from the available list to view its values As a result a complete list of possible values is displayed under Environment Attribute Values Add New Environment Environment Value Match Id Description Environment Attributes Environment Attribute Values Environment Attributes for the Staff Environment Attributes for the Facu
39. ed Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 3 Click on the Add Resource button on the bottom right corner of the below interface Resource Resource Name No records found Resource Attributes Resource Attributes Value No records found No records found interface further has three main portions to add the Resource Attributes and Attribute V highlighted with a b and c in below figure lues as Resource Mame Resource Description Resource Attribute Values No records found No records found Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund a The first portion of the interface consists of Resource Name and Resource Description text boxes In order to create a Resource add the required name and description in text boxes Create Resource Resource Mame 55C Student Sharing Center Resource Description b 1 The second part of the Create Resource interface provides the Add Attribute button to add the required Attributes for a particular Resource l 1 Mo records f
40. elow figure Action Name Action Description Student Action Actions that can be performed by the Students Update Delete 2 The following interface appears after selecting the Update option in previous step You can update any of the two values which include Action Name or Action Description After updating the required fields click on the Save button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Update Action Action Name Faculy Action Actions that can be performed by the Action Description Faculty 3 The updated results are visible on the main Action interface as shown below 4 1 Action Description Faculy Action Actions that can be performed by the Faculty 4 Similarly any Attribute of the Action can also be updated Right click on the frequired Attribute under the Action Attribute tab of the main Action interface Select the Update option from the menu Action Attributes Action on Server Action on LIS Update Delete 5 Update Action Attribute interface is displayed on the screen Enter the required name in the Attribute Name text box and click on Save button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Se
41. er DC 2 The PAP interface titles are specified with Capital First Letter and Bold font style DC 3 Names of main PAP phases are written in single quotes with Capital First Letter Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund A System Learning In this section we have demonstrated how to create update and delete the Subject Action Resource and Environment parameter in System Learning phase 1 Select the System Learning option from the main interface of PAP as shown in below figure The System Learning interface displays the option for Subject Action Resource and Environment Accordingly the below subsection demonstrates the Manage Subject Manage Resource Manage Action and Manage Environment SL 1 Manage Subject We demonstrate how the system administrator can create update and delete the Subject parameter in System Learning phase It further consists of three sections namely Create Subject Update Subject and Delete Subject MS 1 Create Subject 1 Select the Subject option from dropdown list as depicted below System Learning Subject Resource Action Environment Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Se
42. existing Policy right click on that specific Policy add choose Update from the displayed menu Policy Policy Rule Combining Algorithm Applicable Targets Description Target able to delete data from SSC Data Deletion Deny Override Server Policy for Deleting Data on Server Accessing LMS Deny Override Target able to a accessing resources on LMS LMS Data Access Deny overrides Target able taal r accessing the files and data on server Delete Applicable Rules Rule for deleting data on Database Server Rule for accessing LMSnull Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 In the Update Policy interface edit any of the previously added Policy attribute and click Update to save the changes into the database Update Policy Name Accessing LMS Policy for accessing resources on ee LMS Description Rule Combining Algorithm Permit overrides x Deny Override First applicable Target able to delete data from Sel Deny overrides Target able to access LMS Ordered deny overrides Permit overrides Ordered permit overrides 3 After the successful execution of update function Policy interface displays thd list of updated Policy parameters Policy Policy Ru
43. ity Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 4 Similarly any Attribute of the Resource can also be updated Right click on the Attribute under the Resource Attribute tab of the main Resource interface A menu appears and now select the Update option Resource Attributes Lectures Student Documents 1 5 Update Resource Attribute interface is displayed on the screen Enter the required name in the Attribute Name text box and click on Save button Update Resource Attribute Attribute Name Documents 6 The updated results for the particular Attribute appears under the Resource AttriBute tab on main Resource interface Resource Attributes Lectures Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Similarly the Values for Attribute can also be updated Right click on the name of the Attribute Value under Resource Attribute Value tab Now select the Update option from the dropdown list Resource Attributes Value BESE 2 BESE 1 7 7 1 7 7 8 The following window is appeared Enter the new required value for Attribute and then click on Save button Updat
44. kistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 3 Inthe Create Rule interface specify Rule Name Description and its corresponding Effect and click on Save to insert the new Rule parameter into the database and Cancel to discard the added information Create Rule Create Rule Name Accessing LMS Rule for accessing Learning A Management System Description 3 3 Effect Permit 7 Target Description Target that allows Faculty to access Learning Management System 4 Upon successful creation of Rule its Name Effect Applicable targets andr Description appears in the main Rule interface Applicable Targets Description Target that allows Faculty to Accessing LMS access Learning Management Rule for accessing Learning Management System System Add Rule Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MU 2 Update Rule 1 In order to update any existing Rule parameter right click on that specific Rule and choose Update from the displayed menu Applicable Targets Description Target able to delete data from Data Deletion Permit iets J Update Accessing LMS Permit mel Target able t
45. lated parameters including Subject Action Resourte and Environment Policy Creation Rule Policy Policy Set Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MT 1 Create Target 1 Below is the main Target interface which is used to add update and delete Target parameters It also provides the provision to associate existing Subject Resource Action and Environment parameters with the new or existing Target parameters Target Target Description No records found Available Subjects Available Resources Available Actions Available Environments No records found No records found No records found No records found Add Target 2 Initially when No Records Found for Target parameter then add option for Ayailable Subjects Available Resources Available Actions and Available Environnjents is disabled Target Available Subjects Available Resources Available Actions Available Environments No records found No records found No records found 1 No records found 1 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 W
46. le Combining Algorithm Applicable Targets Description Target able to delete data fro SSC Data Deletion Deny Override Zo E tO BEJELE Gata trom Accessing LMS Target able to access LMS Policy for accessing resources on LMS LMS Data Access Deny overrides Target able to access LMS Policy for accessing the files and data on server Policy for Deleting Data on Server Applicable Rules Rule for deleting data on Database Server Rule for accessing LMSnull Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MP 3 Delete Policy 1 In order to Delete any of the existing Policy right click on that particular Policy and select Delete from the menu Policy Policy Rule Combining Algorithm Applicable Targets Description Target able to delete data from er SSC Data Deletion Deny Override Policy for Deleting Data on Server Update Accessing LMS Permit overrides et able to access LMS Policy for accessing resources on LMS Delete LMS Data Access Deny overrides A get able to access LMS Policy for accessing the files and data on server Applicable Rules Rule for deleting data on Database Server Add Policy 2 After the successful deletion of selected Policy updated list of available Policy
47. lty Environment Attributes for the Students LJ Must Be Present A t tab select any particular value and click Next Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund d 3 In the Match Id tab list of possible match ids for the previously selected Environment Value is presented Select any match Id value from the available list and click Save to add the selection Environment Value and Match Id against the individual Target Whereas click on Back button will take you back to the Environment Value interface and Cancel Add New Environment Environment Value Match Id string equal string bag string bag size string is in string one and only 4 Back will discard all the selections and return to the main Target interface 6 From the main Target interface select any available Target to view all of its associated Subjects Actions Resources and Environments Target Target Description Access LMS Target that allows Faculty to access Learning Management System Available Subjects Available Resources Available Actions Available Environments string stringrequal 2years 2 stringrequal 2years string equal Quizes string equal Quizes Quizes string stringrequal Read Read cc
48. n of this interface contains the Environment Attributes tab that enlists the added Attributes for a given Environment Initially when there are no records in the database the button is disabled Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Environment Attributes No records found c The third portion of the interface consists of Environment Att ibute Values tab that gives a list of different values for a specific Attribute At the start when no Environment Attribute and Attribute values are added the sign is disabled Environment Attribute Value Mo records found 3 Click on the Add Environment button on the bottom right corner of the below intefface Environment Environment Name Environment Description No records found Environment Attributes Environment Attribute Value No records found No records found Add Environment Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 4 The Create Environment interface is opened to add th
49. o access LMS Rule for accessing LMSnull Rule for deleting data on Servernull 2 In the Update Rule interface edit any of the previously added Rule attribute And click Update to save the changes into the database Update Rule Name Data Deletion Rule for deleting data on Database ase Server Description Permit Mi Target Description Target able to delete data from Server Target able to access LMS Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project Data Deletion Accessing LMS National ICT R amp D Fund 3 After the successful execution of update function Rule interface displays the list of updated Rule parameters Applicable Targets Description Target able to delete data from Rule for deleting data on Database Server Server Target able to access LMS Rule for accessing LMSnull Add Rule MU 3 Delete Rule Accessing LMS Data Deletion Accessing LMS 1 In order to Delete any of the existing Rule right click on that particular Rul and select Delete from the menu Applicable Targets Description Target that allows Faculty to access Learning Management Rule for accessing Learning Management System LMS System Target that allows Faculty to access Learning M
50. on the specific Subject and then select the Update option form the menu as depicted in below figure Intermediary Subject Delete _ _ ___ _ __ _ ____ 2 The following interface appears after selecting the Update option in previous step You can update any of the three values which include Subject Name Subject Description or Subject Category After updating the required fields click on the Save button Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Update Subject Subject Name Faculty Subject of the faculty Subject Description Intermediary Subject 7 Subject Category Recipient Subject Mi Requesting Machine Subject Subject Description Faculty Recipient Subject Subject of the faculty l 4 Similarly any Attribute of the Subject can also be updated Right click on the requifed attribute under the Subject Attribute tab of Subject interface A dropdown menu appears select the Update option Subject Attributes Education Experience Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk proj
51. onal ICT R amp D Fund Add Subject Attribute Attribute Mame Education String Data Type Integer Boolean Attribute Value PHD o dl b 3 The added attribute is displayed under the Subject Attributetab as shown in below figure E 7 7 1 7 7 Subject Attributes Subject Attribute Values Education Mo records found Add Attribute Add Attribute Value c 1 The third portion of the Create Subject interface consists of the Add Attribufe Value button to add more than one value for specific attribute It is mandatory to gelect the required Attribute from the list of Subject Attributes before adding the values If the Add Attribute Value button is clicked without selecting any Attribute fa warning message appears to first select the desired Attribute Subject Attributes Subject Attribute Values Education Add Attribute Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 2 Click on the Add Attribute Value button to add a new value for the selected Attribute Subject Attribute Values Add Attribute Value c 3 The following window appears on the screen containing the Attribute Value text box Enter the required value and then click on Save button
52. ound b 2 The following interface 1s displayed to add the required Resource Attribute of Attribute Name Data Type and Attribute Value text boxes Enter the required Attribute name its value and select the data type from the given list Fip 4lly click on the Save button as shown below It consists E b Add Resource Attribute Attribute Mame Lectures String Data Type Integer Boolean Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund b 3 The added Attribute is displayed under the Resource Attribute tab as shown in below figure Resource Attributes Resource Attribute Values Lectures s No records found Add Attribute Value c 1 The third part of the Create Resource interface consists of the Add Attribute Value button to add more than one value for specific Attribute It is compulsory to select the required Attribute from the Resource Attributes before adding the values If the Add Attribute Value button is clicked without selecting any Attribute a warning tpessage i 1S popped out to first select the desired Attribute l Resource Attribute Values Lectures Add Attribute Value c 2 Click on the Add Attribute Value button to add a new value forthe selected Attribu
53. parameters is displayed on the Target interface Description Accessing LMS Target able to access LMS Available Subjects Available Resources Available Actions Available Environments No records found No records found No records found No records found PC 2 Manage Rule Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Eunda update and delete Rule and its corresponding Target p from the main Policy Creation dropdown menu F Ne y we UNA p gt i 4 Policy Creation Target Policy Policy Set Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MU 1 Create Rule 1 Below is the main Rule interface which is used to add update and delete Rule and its related parameters No records found 2 Click on Add Rule button to add new Rule parameter into the database Applicable Targets No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pa
54. pears on the screen containing the Attribute Value text box Enter the required valte for Attribute and then clickseff Save button as shown in below figure NE Add Environment Attribute Value Attribute Value 15 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 4 After saving the Attribute Value the following two values are visible under the Environment Attribute Values tab as shown in below figure Environment Attribute Values Add Attribute Value 7 1 7 1 T 5 Now click on the Save button in the Create Environment interface to save the added Environment in database as shown below I Create Environment Environment Name Faculty Environment Enter the environment name here Environment attributes for the faculty Environment Description Environment Attributes Environment Attribute Values timings Add Attribute Value Save Cancel 6 The added Action is displayed on Environment interface with its values under the Environment Name and Environment Description tabs as shown in below figure Environment Environment Name Environment Description Faculty Environment Environment attributes for the faculty PP KTH SEECS Applied
55. ption from dropdown list as depicted below System Learning resource Action Environment 2 After selecting the Resource option in previous step the following Resource interface is displayed to add the new Resource This interface further includes three main portions as highlighted with a b and c in the below figure Resource Attributes Value No records found No records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund a The first part of the Resource interface contains Resource Name and Resource Description tabs Resource No records found f b The second portion of this interface contains the Resource Attributes tab that enlists the added Attributes for a given Resource Initially when there are no recotds the button 1 is disabled i 7 Resource Attributes Mo records found C The third part of the interface consists of Resource Attribute Values tab thaf gives a list of different values for a specific Attribute At the start when no Resource Attribute and Attribute Values are added the button is disabled Resource Attributes Value Mo records found Extensible Access Control Framework for Cloud bas
56. rder to view the values for specific Attributes click on the required Attribute It also enables the button as shown below By clicking on button more Attribute Values tan be added to the selected Attribute Resource Attributes Resource Attributes Value Lectures BESE 2 Student Documents BESE 1 Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund MR 2 Update Resource 1 To update an added Resource right click on that specific Resource in Resource interface and then select the Update option form the menu as depicted in below figure Resource These are the available resources Student Sharing Center 2 The following interface appears after selecting the Update option in previous step You can update any of the two values which include Resource Name or Resource Description After updating the required fields click on the Save button Update Resource Resource Name LMS Learning Management ee system Resource Description i 3 The updated results are visible on the main Resource interface as shown bele Resource Resource Description Learning Management System f Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Secur
57. rds found 3 Right click on Attribute under Subject Attributes tab on Subject interface Cligk on the Delete option from the dropdown list Subject Attributes Education Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 4 The selected Attribute is deleted along with all of its Attribute Values as shown in below figure Subject Attributes Subject Attribute Values No records found No records found gt 5 To delete a particular Attribute Value right click on that value ETEA the Subject Attribute Value tab and click on the Delete option 7 Subject Attribute Values PHD MS Update Delete 6 The selected Attribute value is deleted as depicted in below figure Subject Attribute Values Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund SL 2 Manage Resource This section demonstrates how to create update and delete the Resource parameter in System Learning phase MR 1 Create Resource 1 In order to create Resource select the Resource o
58. ributes Subject Attributes No records found f 7 7 1 7 1 c The third portion of the interface consists of Subject Attribute Values tab that gives a list of different values for a specific attribute At the start when no Subject Attribute and Attribute Values are added the sign 1s disabled These are the available subject attribute values Mo records found Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Subject Subject Name No records found Subject Attributes No records found Subject Category Subject Description Subject Attribute Values No records found y Add Subject 4 The Create Subject interface opens to add the required Subjects This interface further Ipas three main portions to add the Subject Attributes and Attribute Values as highlighted with f a b and c in below figure Create Subject Create Subject Subject Name Subject Description a Subject Category Select Category hd Subject Attributes No records found b Add Attribute Subject Attribute Values No records found Add Attribute Value Extensible Access Control Framework for Cloud based Applications K
59. rvice gateway between PDP and the requested resource application or service it intercepts the authorization requests and forwards it to the PDP for decision making permit deny 1 This manual briefly describes how ABAC policies are created using the PAP web interface It further includes detailed screenshots illustrating each and every step that the user might take to complete different processes for all the main phases including System Learning Policy Creation and Policy Generation This manual is intended for system administrators who may use this document as the guideline for the generation of access control policy Scope This user manual is focused on ABAC model of the framework that elaborates the use f Policy Administration Point for creation and management of ABAC policies It mainly focuses on three Subject 11 Manage Action 111 Manage Resource and iv Manage Environment functions The second phase Tor the PAP namely Policy Creation includes the creation of Target iis how to create delete and p by step instructions for 1 Manage Target 11 Manage Rule 111 Manage Policy and iv Manage PolicySet functions Rule Policy and PolicySet In this regard the A ex update the Policy Creation par imete Furthermore it explains how to use the PAP interfaces for XACML Policy and PolicySet generation Document Convention DC 1 The core XACML tags are highlighted with Capital First Lett
60. sing the files and data on server Policy for accessing resources on LMS Add PolicySet Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project MPS 2 l PolicySet S5C Data Deletion Applicable Policy Sets No records found National ICT R amp D Fund Update Policy Set In order to update any of the existing Policy Set right click on that specific Policy Set and choose Update from the displayed menu Policy Combining Algorithm Applicable Targets Description e to delete data from Permit overrides Pd Policy that allows Faculty to delete data from LMS Update Delete Applicable Policies Policy for accessing resources on LMS Policy for accessing the files and data on server In the Update Policy Set interface edit any of the previously added Policy attribute and click Update to save the changes into the database Update Policy Set PolicySet Id SSC Access Policy Policy Set for Access Permission on che serve Description Policy Combining Algorithm Permit overrides z Target Target that allows Faculty to access Learning Management System N Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Se
61. te of Resource Resource Attribute Values Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 3 The following window appears on the screen containing the Attribute Value text box Enter the required value for Attribute and then click on Save button as shown in below figure Add Resource Attribute Value Attribute Value BESE 2 c 4 After saving the Attribute value the following two valies are visible under the Resource Attribute Values tab as shown in below figure Resource Attribute Values Add Attribute Value 5 Now click on the Save button in the Create Resource interface to save the added R source in database Create Resource Resource Name 55 Q E_O XA A a Enter the resource name here Student Sharing Center Resource Description Enter the resource description here Resource Attributes Resource Attribute Values Lectures Add Attribute Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund
62. the Faculty Update Delete SS 2 The selected Action is deleted as shown in below figure The Action Attributes and Action Attribute Values is also deleted for that specific Action Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund Action Name No records found K_ Action Attributes Action Attribute Value No records found Ec No records found CC 3 In order to delete an Attribute of particular Action click on that Attribute und r Action Attribute tab on the main Action interface Click on the Delete option from the mia Action Attributes Action on Server Action on LMS 4 The select d Attribute is deleted along with all of its Attribute values as shown in below figure Action Attributes Action Attribute Value Action on Server No records found lt Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 5 To delete a particular Attribute value click on that value under the Action Attribute Value tab and click on the Delete option Action Attribute Value
63. the Students Action Attributes Action Attribute Value Action on Server i No records found j 8 In order to add more Action Attributes click on the button as shown below Action Attributes Action on Server 9 Add the required values for Attribute Name Data Type and Attribute Value and then click on Save button Add Action Attribute Attribute Name Action on LMS string Data Type Integer Boolean Attribute Value Log in Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 10 Now two different Action Attributes are visible under the Action Attribute tab as shown in figure below Action Attributes Action Attribute Value Action on Server No records found Action on LMS 4 11 In order to view the values for specific Attributes click on the required Attribute It enables the 1 button as shown below By clicking on button more Attribute values can be added to the 4 selected Attribute Action Attributes Action Attribute Value Action on Server Write Action on LMS Read MA 2 Update Action 1 To update an added Action right click on that specific Action in main Action interface and then select the Update option form the menu as depicted in b
64. the required Attribut under the Environment Attribute tab of the main Environment interface A dropdown menu appears on screen Select the Update option Environment Attributes timings IP Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 5 Update Environment Attribute interface is displayed on the screen Enter the required name in the Attribute Name text box and click on save button Update Environment Attribute Attribute Name Access timings 6 The updated results for the particular Attribute appears under the Environment Attribute tab on main Environment interface Environment Attributes Access timings IP 7 Similarly the values for Attribute can also be updated Right click on the name of the Attribute Value under Environment Attribute Value tab Now select the Update option from the dropdown list Environment Attribute Value 121 74 15 1 Update lt Delete _ _ _ _ _ Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 8 The follo
65. the required Attribute It also enables the button as shown below By clicking on button more Attribute values can be added to the selected Attribute Environment Attributes Environment Attribute Value timings 121 74 15 1 IP ME 2 Update Environment 1 To update ari added Environment right click on that specific Fnvironment in main Environment interface and then select the Update option form the fhenu as depicted in below figure Te Thara arn thn mrenda Environment Faculty Environment Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 The following interface appears after selecting the Update option in previous step You can update any of the two values which include Environment Name or Environment Description After updating the required fields click on the Save button Update Environment Environment Name Faculty Environment attributes ee for the facul Environment Description oF eae 3 The updated results are also visible on the main Environment interface as shown below Environment Environment Name Environment Description Faculty Environment attributes for the faculty 4 Similarly any Attribute of the Environment can also be updated Click onf
66. tion Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 After the successful deletion of selected Policy Set updated list of available Policy Sets 1s displayed in the main Policy Set interface PolicySet Policy Combining Algorithm Applicable Targets Target that allows Faculty to SSC Data Deletion Permit overrides access Learning Management Policy Set for Access Permission on Server System Applicable Policy Sets Applicable Policies No records found Policy for Deleting Data on Server Policy for accessing resources on LMS Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund C Policy Generation This is the final section of this manual In the following section we have demonstrated the generation of XACML based Policy and Policy Set PG 1 Policy Generation 7 1 7 1 If we hover up cursor to the XACML Generation a dropdown menu will appear showing two options XACML Policy Generation and XACML Policy Set Generation XACML Generation Policy Generation 2 Initially if there are no Policies or Policy Sets in the database the message N
67. value and select the data type from the given list Finally click on the Save button as shown below 1 Add Environment Attribute Attribute Name Timings Integer Data Type Boolean anyURI Attribute Value g b 3 The added Attribute is displayed under the Environment Attribute tab as shown in below figure Environment Attributes Environment Attribute Values timings e No records found Add Attribute Value Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund c 1 The third portion of the Create Environment interface consists of the Add Attribute Value button to add more than one value for specific Attribute It is compulsory to select the required Attribute from the Environment Attributes before adding the values If the Add Attribute Value button is clicked without selecting any Attribute a warning message is popped out to first select the desired Attribute Environment Attributes Environment Attribute Values f timings Add Attribute Value c 2 After selecting the required Environment Attribute now click on the Add Attribute Value button to add a new value for the selected Attribute of Environment l Environment Attribute Values Add Attribute Value c 3 The followinig window ap
68. wing window appears on screen Enter the new required value for Attribute and then click on Save button Update Environment Attribute Value Attribute Value 121 98 23 1 shown below Environment Attribute Value 1 21 98 23 1 ME 3 Delete Environment le E 1 Right click on the name of that Environment in main Environment interfate Select the Delete option from the dropdown list Environment Environment Name Faculty Extensible Access Control Framework for Cloud based Applications KTH SEECS Applied Information Security Lab NUST SEECS H 12 Sector Islamabad Pakistan Tel 051 90852164 Fax 051 8317363 Website http ais seecs nust edu pk project National ICT R amp D Fund 2 The selected Environment is deleted as shown in below figure The Environment Attributes and Environment Attribute Values are also deleted for that specific Environment Environment Environment Name No records found Environment Attributes Environment Attribute Value No records found lt No records found 3 In order to delete an attribute of particular Environment click on that attribut under Environment Attribute tab on the main Environment interface Click on the Delete option from the dropdown list Environment Attributes Timings 4 The selected Attribute is deleted along with all of its Attribute Values as shown in below figure Extensible Access Control Framework for Cloud
Download Pdf Manuals
Related Search
Related Contents
CyberHoist II Manual ENG v1.9 取扱説明書 二輪車用ETC 車載器 JRM-11 DMCNET Gateway Module User Manual sen-1988-rec-m2_manuel_controleur MR0457 User Guide Rev. A KOHLER K-4701-CP-96 Installation Guide Copyright © All rights reserved.
Failed to retrieve file