skip to main content
10.1145/2970030.2970040acmotherconferencesArticle/Chapter ViewAbstractPublication PagespraiseConference Proceedingsconference-collections
short-paper

Representing sequences of actions in access control security policies

Published:29 August 2016Publication History

ABSTRACT

In existing access control systems, it is assumed that access control authorisation rules are defined on elementary actions and over concrete objects. This assumption does not hold in general. This paper proposes a slight extension of access control models where both elementary and non-elementary actions can be represented. A non-elementary action, called a plan, is a sequence of elementary actions, to be applied on objects, in order to achieve some task. We propose to represent a plan, denoted by P, as a partial pre-order over a subset of A x O where A is a set of elementary actions and O is a set of objects. We show how to derive explicit prohibitions in the presence of authorisation rules over plans.

References

  1. Muhammad Umar Aftab, Muhammad Asif Habib, Nasir Mehmood, Mubeen Aslam, and Muhammad Irfan. Attributed role based access control model. In 2015 Conference on Information Assurance and Cyber Security (CIACS), pages 83--89. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  2. Salem Benferhat, Mouslim Tolba, Karim Tabia, and Abdelkader belkhir. Integrating non elementary actions in access control models. In To appear in proceedings of 9th International Conference on Security of Information and Networks, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David F Ferraiolo, Ravi Sandhu, Serban Gavrila, D Richard Kuhn, and Ramaswamy Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3):224--274, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Michael A Harrison, Walter L Ruzzo, and Jeffrey D Ullman. Protection in operating systems. Communications of the ACM, 19(8):461--471, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lihui Hu, Jean Mayo, and Charles Wallace. An empirical study of three access control systems. In Proceedings of the 6th International Conference on Security of Information and Networks, pages 287--291. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Aziz Kaddani, Amine Baina, and Loubna Echabbi. Towards a model driven security for critical infrastructures using orbac. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on, pages 1235--1240. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. Anas Abou El Kalam, RE Baida, Philippe Balbiani, Salem Benferhat, Frédéric Cuppens, Yves Deswarte, Alexandre Miege, Claire Saurel, and Gilles Trouessin. Organization based access control. In Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pages 120--131. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Representing sequences of actions in access control security policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and Security
        August 2016
        91 pages
        ISBN:9781450343046
        DOI:10.1145/2970030

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 August 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader