skip to main content
10.1145/3589608.3593843acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
short-paper

Specifying a Usage Control System

Published:24 May 2023Publication History

ABSTRACT

Modern system architectures require sophisticated access and usage control mechanisms. The need stems from demanding requirements for security, data sovereignty and privacy regulations, as well as the challenges presented by architectural approaches like zero trust networking. Usage control systems provide one approach to encapsulate and manage the complexities related to access and usage control. In order to trust a usage control system, it is essential to ensure that usage control policies express the intended properties and are enforced correctly. To achieve this, we need a precise specification of the intended behavior of a usage control system. For attribute-based access control, the XACML standard is a sufficient specification of the behavior of policies. Usage control models, such as UCON, extend access control with features for continuous authorization based on mutability of attribute values. This adds significant complexity to the problem of specifying the intended behavior. In this paper, we identify challenges with specifying a practical usage control system regarding continuous control, obligations, and concurrency aspects. We describe an approach to specifying the UCON+ model of Dimitrakos et al. and outline an implementation of the specification with Answer Set Programming.

References

  1. Dhouha Ayed, Marie-Noelle Lepareux, and Cyrille Martins. 2015. Analysis of XACML policies with ASP. In 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  2. John Backes, Pauline Bolignano, Byron Cook, Catherine Dodge, Andrew Gacek, Kasper Luckow, Neha Rungta, Oksana Tkachuk, and Carsten Varming. 2018. Semantic-based Automated Reasoning for AWS Access Policies using SMT. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 1--9.Google ScholarGoogle Scholar
  3. Gabriele Baldi, Yair Diaz, Theo Dimitrakos, Fabio Martinelli, Christina Michailidou, Paolo Mori, Oleksii Osliak, and Andrea Saracino. 2020. Session-dependent Usage Control for Big Data. Journal of Internet Services and Information Security, Vol. 10, 3 (Aug. 2020), 76--92.Google ScholarGoogle Scholar
  4. Enrico Carniani, Davide D'Arenzo, Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2016. Usage Control on Cloud systems. Future Generation Computer Systems, Vol. 63 (Oct. 2016), 37--55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Haining Chen. 2017. Improving the Policy Specification for Practical Access Control Systems. Ph.,D. Dissertation. Purdue University.Google ScholarGoogle Scholar
  6. Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2010. A Proposal on Enhancing XACML with Continuous Usage Control Features. In Grids, P2P and Services Computing. Springer, 133--146.Google ScholarGoogle Scholar
  7. Yuri Demchenko, Oscar Koeroo, Cees de Laat, and Hakon Sagehaug. 2008. Extending XACML Authorisation Model to Support Policy Obligations Handling in Distributed Application. In Middleware for Grid Computing (MGC '08). ACM, New York, NY, USA, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, and Andrea Saracino. 2020. Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. In Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 1801--1812.Google ScholarGoogle Scholar
  9. Donia El Kateb, Yehia ElRakaiby, Tejeddine Mouelhi, Iram Rubab, and Yves Le Traon. 2015. Towards a Full Support of Obligations in XACML. In Risks and Security of Internet and Systems. LNCS, Vol. 8924. Springer, 213--221.Google ScholarGoogle Scholar
  10. Danielle Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks, Kevin Orr, and Jay Ligatti. 2020. PoCo: A Language for Specifying Obligation-Based Policy Compositions. In Proceedings of the 2020 9th International Conference on Software and Computer Applications. ACM, 331--338.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ali Hariri, Amjad Ibrahim, Bithin Alangot, Subhajit Bandopadhyay, Antonio La Marra, Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos. 2023. UCON: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 209--226.Google ScholarGoogle Scholar
  12. Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, and Bruno Crispo. 2022. WiP: Metamodel for Continuous Authorisation and Usage Control. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies. ACM, New York, NY, USA, 43--48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Graham Hughes and Tevfik Bultan. 2008. Automated verification of access control policies using a SAT solver. International Journal on Software Tools for Technology Transfer, Vol. 10, 6 (Dec. 2008), 503--520.Google ScholarGoogle ScholarCross RefCross Ref
  14. Amjad Ibrahim and Theo Dimitrakos. 2023. Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 123--144.Google ScholarGoogle Scholar
  15. Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, and Flemming Nielson. 2013. XACML 3.0 in Answer Set Programming. In Logic-Based Program Synthesis and Transformation,, Elvira Albert (Ed.). Springer, 89--105.Google ScholarGoogle Scholar
  16. Vladimir Kolovski. 2008. A Logic-Based Framework for Web Access Control Policies. PhD Thesis. University of Maryland.Google ScholarGoogle Scholar
  17. Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2012. A Prototype for Enforcing Usage Control Policies Based on XACML. In Trust, Privacy and Security in Digital Business. LNCS, Vol. 7449. Springer, 79--92.Google ScholarGoogle Scholar
  18. Joohyung Lee, Yi Wang, and Yu Zhang. 2015. Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming. In Conference on Logic Programming, Technical Communications (ICLP 2015) (CEUR Workshop Proceedings, Vol. 1433). CEUR-WS.org, Aachen, 13.Google ScholarGoogle Scholar
  19. Ninghui Li, Haining Chen, and Elisa Bertino. 2012. On practical specification and enforcement of obligations. In Proceedings of Data and Application Security and Privacy - CODASKY '12. ACM Press, 71.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vladimir Lifschitz. 2019. Answer Set Programming. Springer.Google ScholarGoogle Scholar
  21. Xie Lili and Zhai Zhigang. 2019. Formal Specification of Concurrent Enforcement UCON Model with CTL Logic. In Artificial Intelligence and Security. LNCS, Vol. 11633. Springer, 627--641.Google ScholarGoogle Scholar
  22. Johannes Lohmö ller, Jan Pennekamp, Roman Matzutt, and Klaus Wehrle. 2022. On the need for strong sovereignty in data ecosystems. In Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB 2022), Sydney, Australia, September 5, 2022 (CEUR Workshop Proceedings, Vol. 3306), Cinzia Cappiello, Sandra Geisler, and Maria-Esther Vidal (Eds.). CEUR-WS.org, Aachen, 51--63.Google ScholarGoogle Scholar
  23. Fabio Martinelli, Paolo Mori, Andrea Saracino, and Francesco Di Cerbo. 2019. Obligation Management in Usage Control Systems. In Parallel, Distributed and Network-Based Processing (PDP). IEEE, 356--364.Google ScholarGoogle Scholar
  24. OASIS. 2014. XACML v3.0 Administration and Delegation Profile V.1.0.Google ScholarGoogle Scholar
  25. OASIS. 2015. Abbreviated Language for Authorization V.1.0 WD 01.Google ScholarGoogle Scholar
  26. OASIS. 2017. eXtensible Access Control Markup Language (XACML) V.3.0 Err.01.Google ScholarGoogle Scholar
  27. Jaehong Park and Ravi Sandhu. 2004. The UCON $_textrmABC $ usage control model. ACM Transactions on Information and System Security, Vol. 7, 1 (Feb. 2004), 128--174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Julia Pohle. 2020. Digital sovereignty. A new key concept of digital policy in Germany and Europe. Technical Report. Konrad-Adenauer-Stiftung, Berlin.Google ScholarGoogle Scholar
  29. Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, and Flemming Nielson. 2014. The logic of XACML. Science of Computer Programming, Vol. 83 (2014), 80--105. Formal Aspects of Component Software (FACS 2011 selected & extended papers).Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Mohsen Rezvani, David Rajaratnam, Aleksandar Ignjatovic, Maurice Pagnucco, and Sanjay Jha. 2018. Analyzing XACML policies using answer set programming. International Journal of Information Security, Vol. 18, 4 (2018), 465--479.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Andreas Schaad and Jonathan D. Moffett. 2002. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (Monterey, California, USA) (SACMAT '02). ACM, New York, NY, USA, 13--22.Google ScholarGoogle Scholar
  32. Julian Schuette and Gerd Stefan Brost. 2018. LUCON: Data Flow Control for Message-Based IoT Systems. In Trust, Security And Privacy In Computing And Communications / Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, New York, NY, USA, 289--299.Google ScholarGoogle Scholar
  33. Nan Zhang, Mark Ryan, and Dimitar P. Guelev. 2005 b. Evaluating Access Control Policies Through Model Checking. In Information Security. LNCS, Vol. 3650. Springer, 446--460.Google ScholarGoogle Scholar
  34. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park. 2005 a. Formal model and policy specification of usage control. ACM Transactions on Information and System Security, Vol. 8, 4 (Nov. 2005), 351--387.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Specifying a Usage Control System

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies
        May 2023
        218 pages
        ISBN:9798400701733
        DOI:10.1145/3589608

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 May 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate177of597submissions,30%

        Upcoming Conference

        SACMAT 2024
      • Article Metrics

        • Downloads (Last 12 months)146
        • Downloads (Last 6 weeks)13

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader