The ABC Core Model for Usage Control: Integrating Authorizations, oBligations, and Conditions
نویسنده
چکیده
In this paper, we introduce the family of ABC (Authorizations, oBligations, and Conditions) models for usage control (UCON). We call these core models because they address the essence of usage control, leaving administration, delegation and other important but second-order issues for later work. The term usage control is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on users’ access to target resources. Obligations are requirements that have to be fulfilled by obligation subjects for allowing access. Conditions are subject and object-independent environmental requirements that have to be satisfied for access. In today’s highly dynamic, distributed environment, obligations and conditions are also crucial decision factors for richer and finer controls on usage of digital resources. Although they have been discussed occasionally in recent literature, most authors have been motivated from specific target problems and thereby limited in their approaches. The ABC model integrates these diverse concepts in a unified framework. Traditional authorization decisions are generally made at the time of requests but hardly recognize ongoing controls for relatively long-lived access or for immediate revocation. Moreover, mutability issues that deal with updates on related subject or object attributes as a consequence of access have not been systematically studied. Unlike other studies that have targeted on specific problems or issues, the ABC model seeks to enrich and refine the access control discipline in its definition and scope. The ABC model covers traditional access controls such as mandatory, discretionary and role-based access control. Digital rights management and other modern access controls are also covered within the model. We believe our ABC core model for UCON lays the foundation for next generation access controls that are required for today’s real world information and systems security. This paper articulates the core of this new area of UCON and develops several detailed models.
منابع مشابه
The Research of Access Control Based on UCON in the Internet of Things
In this paper, we introduce the internet of things and related architecture and protocols, and the family of usage control (UCON) models, which integrate authorizations (A), obligations (B), and conditions (C). The UCON is a generalization of access control to cover authorizations, obligations, conditions, continuity (ongoing controls), and mutability. In the internet of things’ highly dynamic,...
متن کاملLogical Model and Specification of Usage Control
The recent usage control model (UCON) is a foundation for next generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations, obligations, and conditions, presented as UCONABC core models by Park and Sandhu. Based on these core aspects, we develop a firstorder logic specificatio...
متن کاملeGovernment service security policy: obligation conflict resolution in XACMLv3
Today, many governments tend to propose e-services to their citizens. However, implementing an eGovernment environment shall face up to several security challenges including integrating security requirements coming from multiple stakeholders. In this article, we analyze the conflicts that can occur between eGovernment security requirements. Since these security requirements can contain both aut...
متن کاملThe PEI + UCON Framework for Application Security
There is no security without application context. Only application context can make clear the tradeoffs between security, performance, usability and cost, and further the tradeoffs between conflicting security objectives such as confidentiality, integrity and availability. To capture application security policy we need a more sophisticated model than traditional access control provides. To this...
متن کاملUsage Control, Risk and Trust
In this paper we describe our general framework for usage control (UCON) enforcement on GRID systems. It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management...
متن کامل