The PEI + UCON Framework for Application Security
نویسنده
چکیده
There is no security without application context. Only application context can make clear the tradeoffs between security, performance, usability and cost, and further the tradeoffs between conflicting security objectives such as confidentiality, integrity and availability. To capture application security policy we need a more sophisticated model than traditional access control provides. To this end we developed a model called UCON [2] depicted in figures 1 and 2. UCON is attribute-based but goes beyond traditional attribute-based models in that attributes are mutable and can change automatically as a side-effect of access (or usage). Moreover, UCON accommodates the notions of obligations and conditions which capture additional requirements beyond authorization. Obligations require some action such as clicking on a Agree button before access is granted. Conditions capture system and environmental attributes not directly tied to the subject or object in question. The three cornerstones of UCON, authorizations, obligations and conditions can be applied before, during and after access. The goal of UCON was to unify several different access control extensions that had been published or implemented. Thus far the applications of UCON have not required us to extend it in any fundamental way, although we continue to look for applications that stress UCON so we may discover important extensions.
منابع مشابه
Quantitative Evaluation and Reevaluation of Security in Services
Services are software components or systems designed to support interoperable machine or application-oriented interaction over a network. The popularity of services grows because they are easily accessible, very flexible, provide reach functionality, and can constitute more complex services. During the service selection, the user considers not only functional requirements to a service but also ...
متن کاملTowards an Engineering Framework for Usage Control and Digital Rights Management
The recent popularity of digital information sharing through networking requires new technologies to protect intellectual property rights or digital copyrights. The concept of digital rights management (DRM) has been introduced in this arena. DRM is largely focused on payment-based controls for digital information dissemination and its use. The principal motivation is generation and protection ...
متن کاملSecurity and Trust Management for Virtual Organisations: GridTrust Approach
The GridTrust Security Framework (GSF) offers security and trust management for the next generation Grids (NGG). It follows a vertical approach for Grid security from requirements level right down to application and middleware levels. New access control models for collaborative computing, such as the usage control model (UCON), are implemented for securing the Grid systems. The GSF is composed ...
متن کاملComponent Lifecycle and Concurrency Model in Usage Control (UCON) System
Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems....
متن کاملSecure Interoperation in Multidomain Environments Employing UCON Policies
Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009