Abstract
In this paper, we define a core language to express access control, usage control and obligation policies and we specify a policy controller in charge of evaluating such policies. This policy language can be used to specify security requirements of many applications such as drm (Digital Right Management), P2P or Web Service applications. It is used to express both contextual permissions and obligations. In our formalism, a permission is associated with two conditions: The “start condition” that must be true just when the access request is evaluated (access control) and the “ongoing condition” that must be always satisfied while the access is in progress (usage control). Moreover, we introduce the concept of cancellation actions to authorize users to cancel access in progress. Obligations are mandatory access that users must perform. An obligation is associated with two conditions as well: The “raise condition” to trigger the obligation and the “deadline condition” to determine when the obligation is violated. Moreover, we introduce the concept of non-persistent obligation where the raise condition must be true until the corresponding request is received or the deadline expires, otherwise the corresponding access is no longer mandatory.
Résumé
Dans cet article, nous définissons les bases d’un langage pour exprimer des politiques de contrôle d’accès, de contrôle d’usage et d’obligations et spécifions un module de contrôle ayant la charge d’évaluer ces politiques. Ce langage peut être utilisé pour spécifier, par exemple, des exigences de sécurité d’applications de drm (Digital Right Management — Gestion électronique des droits), P2P ou services web. Il permet d’exprimer des permissions contextuelles ainsi que des obligations. Dans notre formalisme, une permission est associée à deux conditions: la condition de „démarrage” qui doit être vraie lorsque la demande d’accès est évaluée (contrôle d’accès) et la condition de „poursuite” qui doit toujours être vérifiée pendant l’exécution de l’action (contrôle d’usage). Nous introduisons également le concept d’action d’annulation pour autoriser les utilisateurs à annuler un accès en cours. Les obligations correspondent aux accès que les utilisateurs doivent réaliser. Nous associons deux conditions aux obligations: la condition de „déclenchement” de l’obligation et la condition „d’échéance” qui détermine à partir de quand l’obligation est violée. De plus, nous proposons le concept d’obligation non persistante lorsque la condition de déclenchement doit rester vraie tant que l’obligation n’est pas remplie ou bien la date d’échéance est atteinte, sinon l’accès correspondant n’est plus obligatoire.
Article PDF
Avoid common mistakes on your manuscript.
References
Alonso G., Casati E., Kuno H., Machiraju V., Web Services: Concepts, Architectures and Applications, Springer-Verlag, 2004
Becker E., Buhse B., Gnnewig D., Rump D., editors. Digital Rights Management: Technological, Economie, Legal and Political Aspects. Lecture Notes in Computer Science — Springer Berlin/Heidelberg, 2003.
Bertino E., Buccafurri F., Ferrari E., Rullo P.. A logic-based approach for enforcing access control, Journal of Computer Security, 82, 3):109–139, 2000.
Bettini C., Jajodia S., Wang X. S., Wijesekera D., Obligation Monitoring in Policy Management. In International Workshop, Policies for Distributed Systems and Networks (Policy 2002), Monterey, California, usa, June 2002.
Content Guard. extensible Rights Markup Language (XrML) 2.0 Specifications, 2001. http://www.contentguard.org.
Cuppens E., Cuppens-Boulahia N., Sans T., Nomad: A Security Model with Non Atomic Actions and Deadlines. In 18th ieee Computer Security Foundations Workshop (CSFW, Aix en Provence, France, June 2005
Cuppens E., Miège A., Modelling Contexts in the Or-BAC Model. In 19th Applied Computer Security Associates Conference (acsac 2003), Las Vegas, Nevada, December 2003.
Cuppens E., Miège A., Administration Model for Or-BAC. Special issue of the International Journal of Computer Systems Science and Engineering (csse), 19(3), May 2004.
De Capitani di Vimercati S., Samarati P., Jajodia S., Policies, Models, and Languages for Access Control. 2005.
Guth S., Rights Expression Languages, volume 2770, January 2003.
Halpern J.Y., Weissman V., Using First-Order Logic to Reason about policies. In 16th ieee Computer Security Foundation Workshop (CSFW’03), Pacific Grove, California, June 2003.
International Organization for Standardization (iso), ISO/IEC 21000-5:2004 Information technology — Multimedia framework (MPEG-2]) — Part 5: Rights Expression Language, 2004. http://www.iso.ch/iso/fr/prods-services/popstds/mpeg.html.
Lamport L., Specifying Systems. Addison-Wesley Professional, July 2002.
Miège A., Definition of aformal framework for specifying security policies — The Or-BAC model and extensions. PhD thesis, Telecom Paris (École Nationale Suprieure des Tlcommunications), 2005.
Moses T., extensible Access Control Markup Language (XACML) Version 2.0. Technical report, oasis, February 2005. http://.oasis-open.org.
Open Mobile Alliance (oma), oma Digital Rights Management V2.0, 2006. http://www.openmobilealliance.org/releaseprogranVdrmx20.html.
Park J., Sandhu R.. The UCON abc Usage Control Model, acm Transactions on Information and System Security, 7(1), February 2004.
Priebe T., Dobmeier T., Kamprath N., Supporting attribute-based access control with ontologies. In IEEE, editor, The First International Conference on Availability, Reliability and Security, 2006 (ares 2006), Computer Society, Vienna, Austria, avril 2006.
Rosenblatt B., Trippe B., Mooney S., Digital Rights Management: Business and Technology. Wiley, Decembre 2001.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Sans, T., Cuppens, F. & Cuppens-Boulahia, N. A Framework to Enforce Access Control, Usage Control and Obligations. Ann. Telecommun. 62, 1329–1352 (2007). https://doi.org/10.1007/BF03253322
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/BF03253322
Key words
- Computer security
- Temporal logic
- Information protection
- Information system
- Access control
- Theoretical model
- Formal language