Academia.eduAcademia.edu

Outline

Context-Aware Access Control Using Semantic Policies

2008, Ubiquitous Computing And …

Abstract

One of the aspects of autonomic computing is self-protecting where systems are required to consistently enforce security policies in order to allow legitimate actions. The information that comes through the feedback loop after being monitored and analayzed tells the systems what is happening in the environments. The analyzed information describes situation and it is called context. The challenge lies in the question of how the autonomic system protects itself through changes of the situation or context, in other words, how access control policies can be properly written and enforced based on the context. Moreover, when the situation or context changes the policies must also reflect this change. A rudimentary approach is to manually write access control policies for all possible instantiations of the context. This is a cumbersome process and difficult to maintain with a large complex system. This paper focuses on access control policies and addresses these issues by representing context in semantic knowledge and extending a standard access control policy language, XACML, to incorporate the semantic knowledge. The work is validated by a proof of concept implementation.

References (37)

  1. Uv::http://www.w3.org/1999/02/22- rdf-syntax-ns#type: Uv::http://www.w3.org/2002/07/owl#ObjectP roperty: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Alice: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#hasLocation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#room_122: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Alice: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inConsultation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#consultation_1: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Jane: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#hasLocation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#room_122: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Jane: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inConsultation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#consultation_1: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Bob: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inCall: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#Phone_Call_1: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Bob: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inSameCall: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#Alice: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Bob: Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inConsultation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#consultation_1: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Web_NCAP Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#hasLocation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#room_122: Uv::http://flame.cs.dal.ca/~dersingh/owl/ont ology.owl#Web_NCAP Uv::http://flame.cs.dal.ca/~dersingh/ owl/ontology.owl#inConsultation: Uv::http://flame.cs.dal.ca/~dersingh/owl/ontol ogy.owl#consultation_1: 10 REFERENCES
  2. N. Chase, "An autonomic computing roadmap", http://www.ibm.com/developerworks/library/ac- roadmap, 2004.
  3. B. Foote, and J. Yoder, "Big Ball of Mud", in Pattern Languages of Program Design 4, ed. N. Harrison, B. Foote, H. Rohnert, Addison-Wesley, 2000.
  4. P. Lin, A. MacArthur, and J. Leaney, "Defining Autonomic Computing: A Software Engineering Perspective", Proc. Australian Software Engineering Conference, pp. 88-97, 2005.
  5. J. O. Kephart, D. M. Chess. "The Vision of Autonomic Computing." Computer, Jan., 2003, pp41-50.
  6. M. Weiser, "Creating the Invisible Interface", Symposium on User Interface Software and Technology, New York, NY, ACM Press, 1994.
  7. S. Dobson et. al.,"A Survey of Autonomic Communications", ACM Transactions on Autonomous and Adaptive Systems (TAAS), pp. 223-259, December 2006.
  8. T. Moses, "eXtensible Access Control Markup Language (XACML) version 2.0," 2005, http://docs.oasis- open.org/xacml/2.0/access_control-xacml-2.0- core-spec-os.pdf.
  9. H. Cheng, T Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments," Proc. IJCAI Workshop on Ontologies and Distributed Systems, IJCAI, 2003, http://www.cs.vu.nl/~heiner/IJCAI- 03/Papers/Chen.pdf.
  10. A. Corradi, R. Montanari, and D. Tibaldi, "Context-based Access Control for Ubiquitous Service Provisioning", pp. 444-451, 28th Annual International Computer Software and Applications Conference (COMPSAC'04), 2004.
  11. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", Dissertation, 2004.
  12. L. Kagal, and T. Berners-Lee, "Rein: Where policies meet rules in the semantic web," Technical report, MIT, 2005.
  13. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for a Pervasive Computing Environment", In IEEE 4th International Workshop on Policies for distributed Systems and Networks, 2003.
  14. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004.
  15. A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and L. Lott., "KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement", In Proc. 4 th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'03), page 93, 2003.
  16. E. Damiani, S. De Capitani di Vimercati, C. Fugazza, and P. Samarati, "Extending Policy Languages to the Semantic Web", International Conference on Web Engineering (ICWE2004), Lecture Notes in Computer Science, pp. 330-343, July 2004.
  17. T. Priebe, W. Dobmeier, and N. Kamprath, "Supporting Attribute-based Access Control with Ontologies," First International Conference on Availability, Reliability and Security (ARES'06), pp. 465-472, 2006.
  18. A. Toninelli, R. Montanari, and L. Kagal, O. Lassila, "A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments", International Semantic Web Conference, pp. 473-486, 2006.
  19. V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn, "Assessment of Access Control Systems", National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Interagency Report 7316, September 2006.
  20. A. Dersingh, R. Liscano, and A. Jost, "Bridging the Policy Gap in Pervasive Access Control: A Semantic Web Approach," 4 th International Workshop on Managing Ubiquitous Communications and Services, Munich, Germany, May 2007.
  21. G. Antoniou, and F. V. Harmelen, "A Semantic Web Primer", The MIT Press Cambridge, Massachusetts London, England, 2004.
  22. J. Heflin, "OWL Web Ontology Language Use Cases and Requirements", http://www.w3.org/TR/webont-req/, February 2004.
  23. W. Chunkun, "Policy-based Network
  24. Management", Proceeding of IEEE International Conference on Communication Technology, vol 1, pp. 101-105, August 2000.
  25. S. Waldbusser, J. Saperia, and T. Hongal, "Policy Based Management MIB", IETF, RFC 4011, March 2005.
  26. N. Damianou, N. Dulay, E. Lupu, M. Sloman, "The PONDER Policy Specification Language", In Proc. International Workshop of Policies for Distributed Systems and Networks (Policy 2001).
  27. Bristol, UK, January 2001. LNCS 1995: 18-39, Springer-Verlag (2001).
  28. A. Corradi, R. Montanari, and D. Tibaldi, "Context-based Access Control for Ubiquitous Service Provisioning", pp. 444-451, 28th Annual International Computer Software and Applications Conference (COMPSAC'04), 2004.
  29. D. L. McGuinness, and F. van Harmelen, "OWL Web Ontology Language Overview", http://www.w3.org/TR/owl-features/, February 2004.
  30. I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean: SWRL: A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission (21 May 2004).
  31. Protégé Editor and API, http://protege.stanford.edu Accessed July 2007.
  32. Jena API for Java, http://jena.sourceforge.net Access July 2007.
  33. Jess Rule Engine, http://herzberg.ca.sandia.gov/jess Accessed July 2007.
  34. MySQL database, http://www.mysql.com.
  35. Accessed July 2007.
  36. E. F. Sadok and R. Liscano, "A Web Services Framework for 1451 Sensor Networks", Proceedings of the 2005 IEEE Instrumentation and Measurement Technology Conference, 2005. (IMTC 2005) Ottawa, ON Canada May 17-19, 2005.
  37. C. McGregor and B. Kneale, Simulated Neonatal Intensive Care Units to Support Neonatologist International Mobility", Proceedings of the Third IASTED International Conference of Telehealth (Telehealth 2007), Montral, Canada.