skip to main content
article
Free Access

A unified framework for enforcing multiple access control policies

Authors Info & Claims
Published:01 June 1997Publication History
Skip Abstract Section

Abstract

Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually the closed policy). As a consequence, although different policy choices are possible in theory, in practice only a specific policy can be actually applied within a given system. However, protection requirements within a system can vary dramatically, and no single policy may simultaneously satisfy them all.

In this paper we present a flexible authorization manager (FAM) that can enforce multiple access control policies within a single, unified system. FAM is based on a language through which users can specify authorizations and access control policies to be applied in controlling execution of specific actions on given objects. We formally define the language and properties required to hold on the security specifications and prove that this language can express all security specifications. Furthermore, we show that all programs expressed in this language (called FAM/CAM-programs) are also guaranteed to be consistent (i.e., no conflicting access decisions occur) and CAM-programs are complete (i.e., every access is either authorized or denied). We then illustrate how several well-known protection policies proposed in the literature can be expressed in the FAM/CAM language and how users can customize the access control by specifying their own policies. The result is an access control mechanism which is flexible, since different access control policies can all coexist in the same data system, and extensible, since it can be augmented with any new policy a specific application or user may require.

References

  1. 1 K. Apt, H. Blair, and A. Walker. Towards a theory of declarative knowledge. In J. Minker, editor, Foundations of deductive databases, pages 89-148. Morgan Kaufmann, San Mateo, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. A temporal access control mechanism for database systems. IEEE Trans. on Knowledge and Data Engineering, 8(1):67-80, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Elisa Bertino, Sushil Jajodia, and Pierangela Samarati. Supporting multiple access control policies in database systems. In Proc. IEEE Syrup. on Security and Privacy, pages 94-107, Oakland, CA, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Elisa Bertino, Pierangela Samarati, and Sushil Jajodia. Authorizations in relational database management systems. In Proc. A CM Conf. on Computer and Communications Security: pages 140-150. Fairfax, \'A. November 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Elisa Bertino, Pierangela Samarati. and Sushil Jajodin. An extended authorization model for relational databases. IEEE Trans. on Knowledge and Data Engineering, 9(1), 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 D. F. C. Brewer and M. J. Nash. The Chinese wall security policy. In Proc. Syrup. on Security and Privacy, pages 215-228, Oakland, CA, May 1989.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7 Hans H. Briiggemann. Rights in an object-oriented environment. In Carl E. Landwehr and Sushil Jajodia, editors, Database Security, V: Status and Prospects, pages 99-115. North-Holland, Amsterdam, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proc. Syrup. on Security and Privacy, pages 184-194, Oakland, CA, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9 R. Fagin. On an authorization mechanism. A CM Trans. on Database Systems, 3(3):310-319, September 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In Proc. 5th Int'l. Conf. and Syrup. on Logic Programming, pages 1070-1080, 1988.Google ScholarGoogle Scholar
  11. 11 P.G. Griffiths and B. Wade. An authorization mechanism for a relational database system. A CM Trans. on Database Systems, 1(3):243-255, September 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 D. Jonscher and K. R. Dittrich. Argos - A configurable access control system for interoperable environmerits. In David L. Spooner, Steven A. Demurjian, and John E. Dobson, editors, Database Security IX: Status and Prospects, pages 43-60. Chapman & Hall, London, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Dirk Jonscher and Klaus R. Dittrich. An approach for building secure database federations. In Proc. Int'l. Con}. on Very Large Data Bases, pages 24-35, Santiego, Chile, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 T. F. Lunt. Access control policies for database systems. In C. E. Landwehr, editor, Database Security II: Status and Prospects, pages 41-52. North-Holland, Amsterdam, 1989.Google ScholarGoogle Scholar
  15. 15 T. Przymusinski. On the declarative semantics of deductive databases and logic programs. In J. Minker, editor, Foundations of deductive databases, pages 193- 216. Morgan Kaufmann, San Mateo, 1988. Google ScholarGoogle ScholarCross RefCross Ref
  16. 16 F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. A CM Trans. on Database Systems, 16(1):89- 131, March 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 H. Shen and P. Dewan. Access control for collaborative environments. In Proc. A CM Conf. on Computer Supported Cooperative Work, pages 51-58, November 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18 A. van Gelder. The alternating fixpoint of logic programs with negation. In A CM Syrup. on Principles of Database Systems, pages 1-10, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 Thomas Y. C. Woo and Simon S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2,3):107-136, 1993.Google ScholarGoogle Scholar

Index Terms

  1. A unified framework for enforcing multiple access control policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGMOD Record
        ACM SIGMOD Record  Volume 26, Issue 2
        June 1997
        583 pages
        ISSN:0163-5808
        DOI:10.1145/253262
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGMOD '97: Proceedings of the 1997 ACM SIGMOD international conference on Management of data
          June 1997
          594 pages
          ISBN:0897919114
          DOI:10.1145/253260

        Copyright © 1997 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 1997

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader