Academia.eduAcademia.edu

Outline

Enforcement of U-XACML History-Based Usage Control Policy

2016, Lecture Notes in Computer Science

https://doi.org/10.1007/978-3-319-46598-2_5

Abstract

Usage Control policies have been introduced to overcome issues related to the usage of resources. Indeed, a Usage Control policy takes into account attributes of subjects and resources which change over time. Hence, the policy is continuously enforced while an action is performed on a resource, and it is re-evaluated at every context change. This permits to revoke the access to a resource as soon as the new context violates the policy. The Usage Control model is very flexible, and mutable attributes can be exploited also to make a decision based on the actions that have been previously authorized and executed. This paper presents a history-based variant of U-XACML policies composed via process algebra-like operators in order to take trace of past actions made on resources by the subjects. In particular, we present a formalization of our idea through a process algebra and the enhanced logical architecture to enforce such policies.

FAQs

sparkles

AI

What is the impact of the UCON model on traditional access control models?add

The study demonstrates that the UCON model significantly enhances traditional access control by implementing continuous evaluation of policies, leading to more dynamic security management in complex systems.

What role does the POLPA language play in enforcing usage control policies?add

The paper reveals that the POLPA language simplifies the definition of History-based Usage Control policies by allowing policy makers to express execution traces of actions clearly and efficiently.

How are state transitions managed in History-based Usage Control policies?add

State transitions are governed by a specific function called nextState, which takes into account the current system state and the actions performed, enabling adaptive transitions based on historical action traces.

What examples illustrate the application of History-based Usage Control policies?add

The implementation of these policies is exemplified through scenarios such as managing actions at a hydroelectric dam, where permissions vary with hazard levels, demonstrating real-time policy adaptations.

How does U-XACML extend the capabilities of traditional XACML?add

U-XACML enhances traditional XACML by incorporating constructs for continuous policy enforcement, such as the DecisionTime clause, and supporting usage control principles like attribute mutability.

References (13)

  1. eXtensible Access Control Markup Language (XACML) Ver. 3.0, http://docs.oasis- open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html
  2. Baiardi, F., Martinelli, F., Mori, P., Vaccarelli, A.: Improving grid services security with fine grain policies. In: On the Move to Meaningful Internet Systems 2004: Confederated International Workshops and Posters, GADA, JTRES, MIOS, WORM, WOSE, PhDS, and INTEROP 2004, Agia Napa, Cyprus, October 25-29, 2004. Proceedings. pp. 123-134 (2004)
  3. Birnstill, P., Pretschner, A.: Enforcing privacy through usage-controlled video surveillance. In: 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2013, Krakow, Poland, August 27-30, 2013. pp. 318-323. IEEE (2013)
  4. Brewer, D., Nash, M.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy. pp. 206-214. IEEE Computer Society Press. (1989)
  5. Colombo, M., Lazouski, A., Martinelli, F., Mori, P.: A Proposal on Enhancing XACML with Continuous Usage Control Features, pp. 133-146. Springer US, Boston, MA (2010)
  6. Lazouski, A., Mancini, G., Martinelli, F., Mori, P.: Usage control in cloud systems. In: Pro- cedings of The 7th International Conference for Internet Technology and Secured Transac- tions (ICITST-2012), Infonomics Society (2012). pp. 202-207 (2012)
  7. Martinelli, F., Mori, P.: On usage control for grid systems. Future Generation Computer Systems 26(7), 1032-1042 (2010)
  8. Mauw, S., Massacci, F., Piessens, F., Aktug, I., Naliuka, K.: Special issue on security and trust conspec -a formal language for policy specification. Science of Computer Programming 74(1), 2 -12 (2008), http://www.sciencedirect.com/science/article/pii/S0167642308001056
  9. Park, J., Sandhu, R.: The uconabc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128-174 (Feb 2004), http://doi.acm.org/10.1145/984334.984339
  10. Park, J., Sandhu, R.: The U CON ABC usage control model. ACM Transactions on Informa- tion and System Security 7, 128-174 (2004)
  11. Sarno, C.D., Garofalo, A., Matteucci, I., Vallini, M.: A novel security information and event management system for enhancing cyber security in a hydroelectric dam. IJCIP 13, 39-51 (2016)
  12. Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security frame- work for collaborative computing systems. ACM Transactions on Information and System Security 11(1), 3:1-3:36 (2008)
  13. Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4), 351-387 (Nov 2005)