Skip to main content

UCAT: The Uniform Categorization for Access Control

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2023)

Abstract

The basic primitives of access control models evolve together with the development of new technologies. The increased availability of computers in organizations brought the notion of roles in, the growing popularity of online social networks led to access control models based on relationships. The new era introduces new challenges. One of those is related to data management in collaborative platforms. Being involved in numerous collaborations, the users need convenient solutions to express their access control preferences. In this paper we address this problem by developing an access control model based on categorization. Relying on evidence from cognitive science, we employ categories as a natural primitive for expressing users’ access control preferences. We develop our model using a fragment of hybrid logic and evaluate its performance in a simulated environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, T., Patwa, F., Sandhu, R.: Object-to-object relationship-based access control: model and multi-cloud demonstration. In: 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), pp. 297–304. IEEE (2016)

    Google Scholar 

  2. Augoustinos, M., Walker, I., Donaghue, N.: Social Cognition: An Integrated Introduction. Sage (2014)

    Google Scholar 

  3. Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 187–196. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1542207.1542238

  4. Bell, D.E., Padula, L.J.L.: Secure computer system: unified exposition and multics interpretation (1976)

    Google Scholar 

  5. Blackburn, P., Seligman, J.: Hybrid languages. J. Logic Lang. Inform. 4, 251–272 (1995)

    Article  MathSciNet  Google Scholar 

  6. Bruns, G., Fong, P.W., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 117–124 (2012)

    Google Scholar 

  7. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177–186 (2009)

    Google Scholar 

  8. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2–3), 108–115 (2011)

    Google Scholar 

  9. Crampton, J., Sellwood, J.: Relationships, paths and principal matching: a new approach to access control. arXiv preprint arXiv:1505.07945 (2015)

  10. Damen, S., Hartog, J., Zannone, N.: CollAc: collaborative access control, pp. 142–149 (2014). https://doi.org/10.1109/CTS.2014.6867557

  11. Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)

    Article  MathSciNet  Google Scholar 

  12. Eysenck, M.W., Brysbaert, M.: Fundamentals of Cognition. Routledge (2018)

    Google Scholar 

  13. Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(1), 34–64 (1999)

    Article  Google Scholar 

  14. Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy, pp. 191–202 (2011)

    Google Scholar 

  15. Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using NetworkX. In: Varoquaux, G., Vaught, T., Millman, J. (eds.) Proceedings of the 7th Python in Science Conference, Pasadena, CA, USA, pp. 11–15 (2008)

    Google Scholar 

  16. Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discovery Data (TKDD) 1(1), 2-es (2007)

    Google Scholar 

  17. Paci, F., Squicciarini, A., Zannone, N.: Survey on access control for community-centered collaborative systems. ACM Comput. Surv. (CSUR) 51(1), 1–38 (2018)

    Article  Google Scholar 

  18. Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. (CSUR) 37(1), 29–41 (2005)

    Article  Google Scholar 

  19. Wilkinson, M.D., et al.: The fair guiding principles for scientific data management and stewardship. Sci. Data 3(1), 1–9 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was co-funded by the European Research Council for the project ScienceGRAPH (Grant agreement ID: 819536) and the TIB Leibniz Information Centre for Science and Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Denis Obrezkov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Obrezkov, D., Sohr, K. (2024). UCAT: The Uniform Categorization for Access Control. In: Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia-Cuppens, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2023. Lecture Notes in Computer Science, vol 14552. Springer, Cham. https://doi.org/10.1007/978-3-031-57540-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57540-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57539-6

  • Online ISBN: 978-3-031-57540-2

Publish with us

Policies and ethics