Academia.eduAcademia.edu

Outline

Towards Use-Based Usage Control

https://doi.org/10.1007/978-3-642-30436-1_53

Abstract

In this paper, a new Use-based usage CONtrol (UseCON) approach that supports recording of usages with the help of a new entity, named use, is presented. Uses provide information for the latest state (requested, active, denied, completed or terminated) of every usage and facilitate the fine-grained definition and proper association of attributes to various system entities. The proposed approach provides enhanced contextual information modeling, support of complicated access modes and an alternative approach in obligations modeling. Moreover, UseCON is characterized by high expressiveness and ability to define policy rules in almost natural language.

References (6)

  1. Grompanopoulos, C., Mavridis, I.: Towards differentiated utilization of attribute mutability for access control in ubiquitous computing. Informatics, Panhellenic Con- ference on 0, 118-123 (2010)
  2. Katt, B., Zhang, X., Breu, R., Hafner, M., Seifert, J.P.: A general obligation model and continuity: enhanced policy enforcement engine for usage control. In: Proceed- ings of the 13th ACM symposium on Access control models and technologies. pp. 123-132. SACMAT '08, ACM, New York, NY, USA (2008)
  3. Park, J., Sandhu, R.: The ucon abc usage control model. ACM Trans. Inf. Syst. Secur. 7, 128-174 (February 2004)
  4. Thomas, R.K., Sandhu, R.: Models, protocols, and architectures for secure pervasive computing: Challenges and research directions. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. pp. 164-. PERCOMW '04, IEEE Computer Society, Washington, DC, USA (2004)
  5. Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy speci- fication of usage control. ACM Trans. Inf. Syst. Secur. 8, 351-387 (November 2005)
  6. Zhang, X., Sandhu, R., Parisi-Presicce, F.: Safety analysis of usage control autho- rization models. In: Proceedings of the 2006 ACM Symposium on Information, com- puter and communications security. pp. 243-254. ASIACCS '06, ACM, New York, NY, USA (2006)