Framework for Enforcing Multiple Access Control Policies

نویسندگان

  • Sushil Jajodia
  • Pierangela Samarati
  • Elisa Bertino
چکیده

Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a speciic policy (usually the closed policy). As a consequence, although diierent policy choices are possible in theory, in practice only a speciic policy can be actually applied within a given system. However, protection requirements within a system can vary dramatically, and no single policy may simultaneously satisfy them all. In this paper we present a exible authorization manager (FAM) that can enforce multiple access control policies within a single, uniied system. FAM is based on a language through which users can specify authorizations and access control policies to be applied in controlling execution of spe-ciic actions on given objects. We formally deene the language and properties required to hold on the security specii-cations and prove that this language can express all security speciications. Furthermore, we show that all programs expressed in this language (called FAM/CAM-programs) are also guaranteed to be consistent (i.e., no connicting access decisions occur) and CAM-programs are complete (i.e., every access is either authorized or denied). We then illustrate how several well-known protection policies proposed in the literature can be expressed in the FAM/CAM language and how users can customize the access control by specifying their own policies. The result is an access control mechanism which is exible, since diierent access control policies can all coexist in the same data system, and extensible, since it can be augmented with any new policy a speciic application or user may require. 1 Introduction Several access control policies have been proposed in the literature for controlling access to information. Correspondingly , several authorization models have been formalized and access control mechanisms enforcing them implemented. Each model, and its corresponding enforcing mechanism, implements a single speciied policy, which is in fact built into the mechanism. As a consequence, although diierent policy choices are possible in theory, each access control system is in practice bound to a speciic policy. The major drawback of this approach is that a single policy simply cannot capture all protection requirements that may arise over time. For instance, each of us deals with data protection in different ways. We may have information that we want to keep completely private, information we want to share with everybody, information we want to share with almost everybody (with a few exceptions), and information we …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources

There is increasing demand from both organizations and individuals for technology capable of enforcing sophisticated, context-sensitive policies, whether security and privacy policies, corporate policies or policies reflecting various regulatory requirements. In open environments, enforcing such policies requires the ability to reason about the policies themselves as well as the ability to dyna...

متن کامل

Controlling Access to Published Data Using Cryptography

We propose a framework for enforcing access control policies on published XML documents using cryptography. In this framework the owner publishes a single data instance, which is partially encrypted, and which enforces all access control policies. Our contributions include a declarative language for access policies, and the resolution of these policies into a logical “protection model” which pr...

متن کامل

RBPIM: Enforcing RBAC policies in distributed heterogeneous systems

This paper presents a PCIM-based framework for storing and enforcing RBAC (Role Based Access Control) policies in distributed heterogeneous systems. PCIM (Policy Core Information Model) is an information model proposed by IETF. PCIM permits to represent network policies in a standard form, allowing software from different vendors to read the same set of policy rules. This paper describes a PCIM...

متن کامل

A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery

Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (e.g. finding an appropriate source of location information to enforce a location-sensitive access control policy). In this paper, we introduce a semantic web framework and a meta-control model for dynamically interlea...

متن کامل

Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies

Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (e.g. finding an appropriate source of location information to enforce a location-sensitive access control policy). In this paper, we introduce a semantic web framework and a metra-control model for dynamically interle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997