skip to main content
10.1145/2435349.2435388acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper

A new approach for delegation in usage control

Published:18 February 2013Publication History

ABSTRACT

UCON (Usage Control), a recent access control model, allows temporal control of the usage of permissions according to three criteria: Authorizations, oBligations and Conditions. In this paper, we investigate delegation in UCON and propose a new approach to achieve user-user total and partial delegations with the enforcement of constraints by taking advantage of UCON's existing components: Authorizations, oBligations and Conditions. The approach we propose can be modified and extended, without much effort, to other access control models accommodated by UCON and to a distributed environment.

References

  1. Ezedin Barka and Ravi Sandhu. Framework for Role-based delegation models. In ACSAC'00, pages 168--176, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Xiao Liang Hu. A new approach for delegations in usage control. Master's thesis, The University of Western Ontario, 2012.Google ScholarGoogle Scholar
  3. Yongming Jin, Jinqiang Ren, Jinqiang Huiping Sun, Suming Li, and Zhong Chen. An improved scheme for delegation based on usage control. In Proceedings of the 2008 Int. Conf. on Future Generation Communication and Networking, pages 74--78. IEEE Computer Society, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, and Jean-Pierre Seifert. A general obligation model and continuity: enhanced policy enforcement engine for usage control. In Proc.13th ACM SACMAT, pages 123--132, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Matunda Nyanchama and Sylvia L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(1):p3--33, Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jaehong Park. Usage Control: A Unified Framework for Next Generation Access Control. PhD thesis, George Mason University, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jaehong Park and Ravi Sandhu. Towards usage control models: beyond traditional access control. In Proceedings of 7th ACM SACMAT, pages 57--64, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jaehong Park and Ravi Sandhu. The UCONriptsizeABC usage control model. ACM TISSEC, 7(1):128--174, February 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Farzad Salim, Jason Reid, and Ed Dawson. An administrative model for UCONABC. In Proc. 8th Australasian Conf. on Inf. Security - Volume 105, pages 32--38, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ravi Sandhu. The PEI Framework for Application- Centric Security. In 1st Int. Workshop on Security and Comm. Networks (IWSCN), pages 1--6, 2009.Google ScholarGoogle Scholar
  11. Ravi Sandhu, David Ferraiolo, and Richard Kuhn. The NIST model for role-based access control: towards a unified standard. In Proc. 5th ACM RBAC workshop, pages 47--63, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. Computer, 29(2):p38--47, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. He Wang and Sylvia L. Osborn. An administrative model for role graphs. In DBSec, pages 302--315, 2003.Google ScholarGoogle Scholar
  14. He Wang and Sylvia L. Osborn. Delegation in the role graph model. In Proc. 11th ACM SACMAT, pages 91--100, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. He Wang and Sylvia L. Osborn. Static and dynamic delegation in the role graph model. IEEE Trans. on Knowl. Data Eng., 23:1569--1582, Oct. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Xinwen Zhang. Formal Model and Analysis of Usage Control. PhD thesis, George Mason University, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Zhiyong Zhang, Lin Yang, Qingqi Pei, and Jianfeng Ma. Research on usage control model with delegation characteristics based on OM-AM methodology. In Proc. 2007 IFIP Int. Conf. on Network and Parallel Computing Workshops, pages 238--243, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A new approach for delegation in usage control

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
              February 2013
              400 pages
              ISBN:9781450318907
              DOI:10.1145/2435349
              • General Chairs:
              • Elisa Bertino,
              • Ravi Sandhu,
              • Program Chair:
              • Lujo Bauer,
              • Publications Chair:
              • Jaehong Park

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 18 February 2013

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper

              Acceptance Rates

              CODASPY '13 Paper Acceptance Rate24of107submissions,22%Overall Acceptance Rate149of789submissions,19%

              Upcoming Conference

              CODASPY '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader