Research on a New Access Control Technology

Abstract:

Article Preview

The term usage control (UCON)[1] is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on a subject's access to target resources, and as a consequence of access have not been systematically studied. In this paper we motivate the need for usage control, study a family of ABC models as a core model for usage control and show how it encompasses traditional access control, such as mandatory, discretionary and role-based access control,. In addition, we also discuss architectures that introduce a new reference monitor for usage control and some variations.

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Edited by:

M.L. Li and G.W. Zhang

Pages:

1858-1862

DOI:

10.4028/www.scientific.net/AMR.765-767.1858

Citation:

K. Huang and Y. S. Jian, "Research on a New Access Control Technology", Advanced Materials Research, Vols. 765-767, pp. 1858-1862, 2013

Online since:

September 2013

Export:

Price:

$38.00

[1] Park J, Sandhu R. The UCON usage control model[J]. ACM Transaction on Information and System Security, 2004, 7(1): 128-174.

[2] D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model[M]. MITRE Report, 1973, 2(2547).

[3] John S. Erickson. Fair use, drm, and trusted computing[J]. Communications of the ACM, 46(4): 34-39, (2003).

DOI: 10.1145/641205.641228

[4] M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems[J]. Communications of the ACM, 1976, 19(8): 461-471.

DOI: 10.1145/360303.360333

[5] Security frameworks for open systems: Access control framework[M]. Technical Report ISO/IEC 10181-3, ISO, (1996).

[6] Jaehong Park, Ravi Sandhu, and James Schifalacqua. Security architectures for controlled digital information dissemination[C]. In Proceedings of 16th Annual Computer Security Application Conference, (2000).

DOI: 10.1109/acsac.2000.898877

[7] Jaehong Park and Ravi Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[C], In Proceedings of 7th ACM Symposium on Access Control Models and Technologies, (2002).

DOI: 10.1145/507711.507722

[8] Ravi Sandhu, Haehong Park. Usage control: a vision for next generation access control[C]. Spring. VGorodetsky et al. (Eds): MMM-ACNS 2003, LNCS 2776, 2003: 17-31.

[9] Zhang Xiwen, Pafisi-Presicce F, Sandhu R, et al. Formal model and policy specification of usage control ACM Transactions on Information and System Security[C](TISSEC), 2005, 8(4): 351-387.

DOI: 10.1145/1108906.1108908

[10] Jaehong Park, Xiwen Zhang, and Ravi Sandhu. Attribute Mutability in Usage Control[C]. George Mason University. (2005).

[11] Li Zude, Ye XIaojun. Attribute Analysis of Usage Control(UCON) [C]. The Joint International Computer Conference(JICC2005). 59-64.

DOI: 10.1142/9789812701534_0014

[12] J Park. A Unified Framework For Next Generation Access Control[C]. George Mason University. 2006. 1-100.

In order to see related information, you need to Login.