Towards Use-Based Usage Control
2012, IFIP Advances in Information and Communication Technology
https://doi.org/10.1007/978-3-642-30436-1_53Abstract
In this paper, a new Use-based usage CONtrol (UseCON) approach that supports recording of usages with the help of a new entity, named use, is presented. Uses provide information for the latest state (requested, active, denied, completed or terminated) of every usage and facilitate the fine-grained definition and proper association of attributes to various system entities. The proposed approach provides enhanced contextual information modeling, support of complicated access modes and an alternative approach in obligations modeling. Moreover, UseCON is characterized by high expressiveness and ability to define policy rules in almost natural language.
References (6)
- Grompanopoulos, C., Mavridis, I.: Towards differentiated utilization of attribute mutability for access control in ubiquitous computing. In: Panhellenic Conference on Informatics, pp. 118-123 (2010)
- Katt, B., Zhang, X., Breu, R., Hafner, M., Seifert, J.P.: A general obligation model and continuity: enhanced policy enforcement engine for usage control. In: Proceed- ings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 123-132. ACM, New York (2008)
- Park, J., Sandhu, R.: The ucon abc usage control model. ACM Transactions on Information and System Security 7, 128-174 (2004)
- Thomas, R.K., Sandhu, R.: Models, protocols, and architectures for secure perva- sive computing: Challenges and research directions. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, PERCOMW 2004, pp. 164-170. IEEE Computer Society, Washington, DC (2004)
- Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy spec- ification of usage control. ACM Transactions on Information and System Security 8(4), 351-387 (2005)
- Zhang, X., Sandhu, R., Parisi-Presicce, F.: Safety analysis of usage control autho- rization models. In: Proceedings of the 2006 ACM Symposium on Information, Com- puter and Communications Security, ASIACCS 2006, pp. 243-254. ACM, New York (2006)