skip to main content
10.1145/2523514.2523549acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

An access control framework for hybrid policies

Authors Info & Claims
Published:26 November 2013Publication History

ABSTRACT

Several formal access control models are known in the literature, such as DAC, MAC, RBAC, etc. However, these models cannot meet new security requirements required by flexible and dynamic environments which necessitate a combination of elements of these models, in order to properly express varied data protection needs. In this paper, we present a new method for the specification of access control systems. The method makes it possible to design an access control system specific to the high level policy of an organization. The method is based on a generic UML meta-model of access control called CatBAC (Category Based Access Control), together with a refinement process for the extraction of security requirements from high level policies. Based on the category concept, the CatBAC meta-model allows specifying hybrid policies of access control.

References

  1. A. Abou-El-Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization based access control. In Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pages 120--131, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Barker. The next 700 access control models or a unifying meta-model? In Proceedings of the 14th ACM symposium on Access control models and technologies, pages 187--196, 1542238, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Barker. Logical Approaches to Authorization Policies, volume 7360 of Lecture Notes in Computer Science, pages 349--373. Springer Berlin / Heidelberg, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From uml models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1): 39--91, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Bouzida, L. Logrippo, and S. Mankovski. Concrete- and abstract-based access control. Int. J. Inf. Secur., 10(4): 223--238, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Correa and R. Giandini. A uml extension to specify model refinements. In CLEI 2006, 2006.Google ScholarGoogle Scholar
  7. D. Ferraiolo and D. Kuhn. Role-based access control. In 15th Natl Computer Security Conf., pages 554--563, 1992.Google ScholarGoogle Scholar
  8. P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303--314, 1998.Google ScholarGoogle Scholar
  9. J. A. Pavlich-Mariscal, S. A. Demurjian, and L. D. Michel. A framework of composable access control features: Preserving separation of access control concerns from models to code. Computers & Security, 29(3): 350--379, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Samarati and S. de Vimercati. Access Control: Policies, Models, and Mechanisms, volume 2171 of Lecture Notes in Computer Science, pages 137--196. Springer Berlin / Heidelberg, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Slimani, H. Khambhammettu, K. Adi, and L. Logrippo. Uacml: Unified access control modeling language. In New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, pages 1--8, 2011.Google ScholarGoogle Scholar
  12. L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 45--55, 1029140, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An access control framework for hybrid policies

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
          November 2013
          483 pages
          ISBN:9781450324984
          DOI:10.1145/2523514

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 November 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader