Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1266840.1266874acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

PolicyMorph: interactive policy transformations for a logical attribute-based access control framework

Published: 20 June 2007 Publication History

Abstract

Constraint systems provide techniques for automatically analyzing the conformance of low-level access control policies to high-level business rules formalized as logical constraints. However, there are likely to be priorities for solutions that are not easy to encode formally, so administrator input is often important. This paper introduces PolicyMorph, a constraint system that supports interactive development and maintenance of access control policies that respect both formalized and un-formalized business rules and priorities. We provide a mathematical description of the system and an architecture for implementing it. We constructed a prototype that is validated using a case study in which constraints are imposed on a building automation system that controls door locks. PolicyMorph advances the state-of-the-art in constraint systems by suggesting predictable policy model modifications that will resolve specific constraint violations and then allowing policy administrators to select the appropriate modifications using knowledge that is not formally encoded in the constraint system.

References

[1]
A. Antón, J. Earp, D. Bolchini, Q. He, C. Jensen, and W. Stufflebeam. The Lack of Clarity in Financial Privacy Policies and the Need for Standardization. IEEE Security & Privacy, 2(2):36--45, 2004.
[2]
S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501--546, 2003.
[3]
D. Bell and L. Lapadula. Secure computer systems: Mathematical foundations (volume 1). Technical report, 1973.
[4]
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, Apr. 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.).
[5]
J. P. Boyer, K. Tan, and C. A. Gunter. Privacy sensitive location information systems in smart buildings. In SPC '05: Proceedings of the 3rd International Conference on Security in Pervasive Computing, 2005.
[6]
T. Breaux and A. Antón. Deriving Semantic Models from Privacy Policies. Proc. IEEE 6 th Workshop on Policies for Distributed Systems and Networks, Stockholm, Sweden, pages 67--76, 2005.
[7]
J. Crampton. Specifying and enforcing constraints in role-based access control. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 43--50, New York, NY, USA, 2003. ACM Press.
[8]
B. Demoen and P. Nguyen. Odd Prolog benchmarking. KU Leuven, CW report, 312, 2001.
[9]
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In ICSE '05: Proceedings of the 27th international conference on Software engineering, pages 196--205, 2005.
[10]
J. Halpern and V. Weissman. Using first-order logic to reason about policies. Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, pages 187--201.
[11]
T. Jaeger, R. Sailer, and X. Zhang. Resolving constraint conflicts. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 105--114, New York, NY, USA, 2004. ACM Press.
[12]
T. Jaeger and J. E. Tidswell. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur., 4(2):158--190, 2001.
[13]
A. Kapadia, G. Sampemane, and R. H. Campbell. Know why your access was denied: regulating feedback for usable security. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 52--61, New York, NY, USA, 2004. ACM Press.
[14]
M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy rules. In Computer Security Foundations Workshop (CSFW '06), Venice, Italy, July 2006. IEEE.
[15]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996.
[16]
J. G. Stell. A framework for order-sorted algebra. In AMAST '02: Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology, pages 396--411, Reunion Island, France, September 2002.
[17]
L. Sterling and E. Shapiro. The art of Prolog (2nd ed.): advanced programming techniques. MIT Press, Cambridge, MA, USA, 1994.
[18]
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 45--55, New York, NY, USA, 2004. ACM Press.

Cited By

View all
  • (2012)Managing Privacy and Effectiveness of Patient-Administered Authorization PoliciesInternational Journal of Computational Models and Algorithms in Medicine10.4018/jcmam.20120401033:2(43-62)Online publication date: 1-Apr-2012
  • (2012)Considering privacy and effectiveness of authorization policies for shared electronic health recordsProceedings of the 2nd ACM SIGHIT International Health Informatics Symposium10.1145/2110363.2110425(553-562)Online publication date: 28-Jan-2012
  • (2012)An Attributes-Based Access Control Architecture within Large-Scale Device Collaboration Systems Using XACMLGreen Communications and Networks10.1007/978-94-007-2169-2_124(1051-1059)Online publication date: 4-Jan-2012
  • Show More Cited By

Index Terms

  1. PolicyMorph: interactive policy transformations for a logical attribute-based access control framework

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
        June 2007
        254 pages
        ISBN:9781595937452
        DOI:10.1145/1266840
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 20 June 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. attribute based access control
        2. constraints
        3. policy administration
        4. separation of duty

        Qualifiers

        • Article

        Conference

        SACMAT07
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 177 of 597 submissions, 30%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 13 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2012)Managing Privacy and Effectiveness of Patient-Administered Authorization PoliciesInternational Journal of Computational Models and Algorithms in Medicine10.4018/jcmam.20120401033:2(43-62)Online publication date: 1-Apr-2012
        • (2012)Considering privacy and effectiveness of authorization policies for shared electronic health recordsProceedings of the 2nd ACM SIGHIT International Health Informatics Symposium10.1145/2110363.2110425(553-562)Online publication date: 28-Jan-2012
        • (2012)An Attributes-Based Access Control Architecture within Large-Scale Device Collaboration Systems Using XACMLGreen Communications and Networks10.1007/978-94-007-2169-2_124(1051-1059)Online publication date: 4-Jan-2012
        • (2012)The Process of Policy Authoring of Patient-Controlled Privacy PreferencesElectronic Healthcare10.1007/978-3-642-29262-0_14(97-104)Online publication date: 2012
        • (2009)Strong and weak policy relationsProceedings of the 10th IEEE international conference on Policies for distributed systems and networks10.5555/1812664.1812672(33-36)Online publication date: 20-Jul-2009
        • (2009)Strong and Weak Policy RelationsProceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks10.1109/POLICY.2009.20(33-36)Online publication date: 20-Jul-2009
        • (2009)Symmetrically Oblivious Envelope ProtocolProceedings of the 2009 IEEE International Conference on e-Business Engineering10.1109/ICEBE.2009.37(219-223)Online publication date: 21-Oct-2009

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media