skip to main content
10.1145/2295136.2295144acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Ensuring authorization privileges for cascading user obligations

Authors Info & Claims
Published:20 June 2012Publication History

ABSTRACT

User obligations are actions that the human users are required to perform in some future time. These are common in many practical access control and privacy and can depend on and affect the authorization state. Consequently, a user can incur an obligation that she is not authorized to perform which may hamper the usability of a system. To mitigate this problem, previous work introduced a property of the authorization state, accountability, which requires that all the obligatory actions to be authorized when they are attempted. Although, existing work provides a specific and tractable decision procedure for a variation of the accountability property, it makes a simplified assumption that no cascading obligations may happen, i.e., obligatory actions cannot further incur obligations. This is a strong assumption which reduces the expressive power of past models, and thus cannot support many obligation scenarios in practical security and privacy policies. In this work, we precisely specify the strong accountability property in the presence of cascading obligations and prove that deciding it is NP-hard. We provide for several special yet practical cases of cascading obligations (i.e., repetitive, finite cascading, etc.) a tractable decision procedure for accountability. Our experimental results illustrate that supporting such special cases is feasible in practice.

References

  1. Senate banking committee, Gramm-Leach-Bliley Act, 1999. Public Law 106-102.Google ScholarGoogle Scholar
  2. M. Ali, L. Bussard, and U. Pinsdorf. Obligation Language and Framework to Enable Privacy-Aware SOA. In Data Privacy Management and Autonomous Spontaneous Security, volume 5939 of Lecture Notes in Computer Science, pages 18--32. Springer Berlin, Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. Security and Privacy, IEEE Symposium on, 0:184--198, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Netw. Syst. Manage., 11(3):351--372, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. O. Chowdhury, M. Pontual, W. H. Winsborough, T. Yu, K. Irwin, and J. Niu. Ensuring authorization privileges for cascading user obligations. Technical Report CS-TR-2012-005, UT San Antonio, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Obligations and their interaction with programs. In Proceedings of the 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, Proceedings, pages 375--389, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia. Formal enforcement and management of obligation policies. Data Knowl. Eng., 71:127--147, Jan. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. F. Ferraiolo, R. S. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security, pages 224--274, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Gama and P. Ferreira. Obligation policies: An enforcement platform. In 6th IEEE International Workshop on Policies for Distributed Systems and Networks, Stockholm, Sweden, June 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Health Resources and Services Administration. Health insurance portability and accountability act, 1996. Public Law 104-191.Google ScholarGoogle Scholar
  12. K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM conference on Computer and communications security, pages 134--143, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. J. I. Jones. On the relationship between permission and obligation. In ICAIL '87, New York, NY, USA. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Li, H. Chen, and E. Bertino. On practical specification and enforcement of obligations. In Proceedings of the second ACM conference on Data and application security and privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In CSFW '06, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. McCarty. Pemissions and obligations. In Proceedings IJCAI-83, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. H. Minsky and A. D. Lockman. Ensuring integrity by adding obligations to privileges. In Proceedings of the 8th international conference on Software engineering, pages 92--102, Los Alamitos, CA, USA, 1985. IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Q. Ni, E. Bertino, and J. Lobo. An obligation model bridging access control policies and privacy policies. In SACMAT' 08, New York, NY, USA. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In Proceedings of the SACMAT'07, New York, NY, USA. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Pontual, O. Chowdhury, W. Winsborough, T. Yu, and K. Irwin. Toward Practical Authorization Dependent User Obligation Systems. In ASIACCS' 10, pages 180--191. ACM Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Pontual, O. Chowdhury, W. H. Winsborough, T. Yu, and K. Irwin. On the management of user obligations. SACMAT '11, New York, NY, USA. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security, 2(1):105--135, Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Sasturkar, P. Yang, S. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. In Computer Security Foundations Workshop, 2006. 19th IEEE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. D. Stoller, P. Yang, C. R. Ramakrishnan, and M. I. Gofman. Efficient policy analysis for administrative role based access control. In CCS '07, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In POLICY'03, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. XACML TC. Oasis extensible access control markup language (xacml). http://www.oasis-open.org/committees/xacml/.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SACMAT '12: Proceedings of the 17th ACM symposium on Access Control Models and Technologies
    June 2012
    242 pages
    ISBN:9781450312950
    DOI:10.1145/2295136

    Copyright © 2012 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 June 2012

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    SACMAT '12 Paper Acceptance Rate19of73submissions,26%Overall Acceptance Rate177of597submissions,30%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader