skip to main content
article
Free Access

An access control model supporting periodicity constraints and temporal reasoning

Published:01 September 1998Publication History
Skip Abstract Section

Abstract

Access control models, such as the ones supported by commercial DBMSs, are not yet able to fully meet many application needs. An important requirement derives from the temporal dimension that permissions have in many real-world situations. Permissions are often limited in time or may hold only for specific periods of time. In this article, we present an access control model in which periodic temporal intervals are associated with authorizations. An authorization is automatically granted in the specified intervals and revoked when such intervals expire. Deductive temporal rules with periodicity and order constraints are provided to derive new authorizations based on the presence or absence of other authorizations in specific periods of time. We provide a solution to the problem of ensuring the uniqueness of the global set of valid authorizations derivable at each instant, and we propose an algorithm to compute this set. Moreover, we address issues related to the efficiency of access control by adopting a materialization approach. The resulting model provides a high degree of flexibility and supports the specification of several protection requirements that cannot be expressed in traditional access control models.

References

  1. ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15, 4 (Sept.), 706-734. Google ScholarGoogle Scholar
  2. BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1996a. A temporal access control mechanism for database systems. IEEE Trans. Knowl. Data Eng. 8, 1 (Feb.), 67-80. Google ScholarGoogle Scholar
  3. BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1996b. Supporting periodic authorizations and temporal reasoning in database access control. In 22nd International Conference on Very Large Databases (VLDB'96) Proceedings (Mumbay, India, Sept. 3-6), 472-483. Google ScholarGoogle Scholar
  4. BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1996c. On using materialization strategies for a temporal authorization model. In Post-SIGMOD Workshop on Materialized Views: Techniques and Applications Proceedings (Montreal, Que., June 6), 34-81.Google ScholarGoogle Scholar
  5. BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1997. Decentralized administration for a temporal access control model. Inf. Syst. 22, 4, 223-248. Google ScholarGoogle Scholar
  6. BERTINO, E., SAMARATI, P., AND JAJODIA, S. 1993. Authorizations in relational database management systems. In First ACM Conference on Computer and Communications Security Proceedings (Fairfax, VA, Nov. 3-5). ACM, New York, 130-139. Google ScholarGoogle Scholar
  7. DATE, C. 1995. An Introduction to Database Systems, 6th edition. Addison-Wesley, Reading, MA. Google ScholarGoogle Scholar
  8. FALASCHI, M., LEVI, G., MARTELLI, M., AND PALAMIDESSI, C. 1988. A new declarative semantics for logic languages. In Fifth International Conference and Symposium on Logic Programming Proceedings (Seattle, WA, Aug. 15-19), 993-1005.Google ScholarGoogle Scholar
  9. FERRARI, E. 1998. Access control mechanisms for database systems: Formal models and architectural aspects. Ph.D. Thesis, Dipartimento di Scienze dell'Informazione, Universita` di Milano.Google ScholarGoogle Scholar
  10. FOUNDATION, O. S. 1993. OSF/Motif Programmer's Guide. Prentice-Hall, Englewood Cliffs, NJ.Google ScholarGoogle Scholar
  11. GELDER,A.V.,ROSS, K., AND SCHLIPF, J. S. 1991. The well-founded semantics for general logic programs. J. ACM 38, 3 (July), 620-650. Google ScholarGoogle Scholar
  12. GELFOND,M.AND LIFSCHITZ, V. 1988. The stable model semantics for logic programming. In Fifth International Conference and Symposium on Logic Programming Proceedings (Seattle, WA, Aug. 15-19), 1070-1080.Google ScholarGoogle Scholar
  13. GOTTLOB, G., MARCUS, S., NERODE, A., SALZER, G., AND SUBRAHMANIAN, V. 1996. A nonground realization of the stable and well-founded semantics. Theor. Comput. Sci. 166, 1&2, 221-262. Google ScholarGoogle Scholar
  14. GUPTA, A., MUMICK, I., AND SUBRAHMANIAN, V. 1993. Maintaining views incrementally. In ACM SIGMOD International Conference on Management of Data Proceedings (Washington D.C., May 26-28), 157-166. Google ScholarGoogle Scholar
  15. INFORMIX SOFTWARE. 1994. The Informix Guide to SQL: Reference and Using Triggers, 1/e, Prentice Hall, Englewood Cliffs, NJ. Google ScholarGoogle Scholar
  16. JAJODIA, S., SAMARATI, P., SUBRAHMANIAN, V., AND BERTINO, E. 1997. A unified framework for enforcing multiple access control policies. In ACM SIGMOD International Conference on Management of Data Proceedings (Tucson, AZ, May 13-15). Google ScholarGoogle Scholar
  17. LU, J., LUDASCHER, B., SCHU, J., AND SUBRAHMANIAN, V. 1996. Well-founded views in constraint databases: Incremental materialization and maintenance. Tech. Rep., University of Maryland.Google ScholarGoogle Scholar
  18. LU, J., MOERKOTTE, G., SCHU, J., AND SUBRAHMANIAN, V. 1995. Efficient maintenance of materialized mediated views. In ACM SIGMOD International Conference on Management of Data Proceedings (San Jose, CA, May 22-25). Google ScholarGoogle Scholar
  19. NIEZETTE,M.AND STEVENNE, J. 1992. An efficient symbolic representation of periodic time. In First International Conference on Information and Knowledge Management Proceedings. (Baltimore, MD, Nov. 2-5).Google ScholarGoogle Scholar
  20. REVESZ, P. 1993. A closed form evaluation for Datalog queries with integer (gap)-order constraints. Theor. Comput. Sci. 116, 1, 117-149. Google ScholarGoogle Scholar
  21. REVESZ, P. 1995. Safe stratified Datalog with integer order programs. In First International Conference on Principles and Practice of Constraint Programming Proceedings (Cassis, France, Sept. 19-22), 154-169. Google ScholarGoogle Scholar
  22. STEINER,J.G.,NEUMAN, C., AND SCHILLER, J. I. 1988. Kerberos: An authentication service for open network systems. In USENIX Conference Proceedings (Dallas, TX, Winter 1988), 191-202.Google ScholarGoogle Scholar
  23. TOMAN, D., CHOMICKI, J., AND ROGERS, D. 1994. Datalog with integer periodicity constraints. In International Logic Programming Symposium Proceedings (Ithaca, NY, Nov. 13-14), 189-203. Google ScholarGoogle Scholar
  24. WOO,T.AND LAM, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2&3, 107-136.Google ScholarGoogle Scholar

Index Terms

  1. An access control model supporting periodicity constraints and temporal reasoning

      Recommendations

      Reviews

      Eduardo B. Fernandez

      An access control model is presented in which periodic temporal intervals are associated with authorizations. Authorizations are valid within a specific interval and are revoked at the end of the interval. The authors first define a formalism for periodic expressions, based on one proposed by Niezette and Stevenne. This is not convenient for automatic manipulation, and for this purpose they use another formalism, based on gap-order constraints. Then they develop a model for authorizations that hold in specific intervals defined by a periodic expression. Periodic authorizations can be positive (permissions) or negative (denials). They use as a basis the standard authorization model with subjects, objects, and access types, augmented with the concept of an authorizer [1], that is, the person or role that granted the authorization. To include temporal aspects they use the concept of an interval, specified by a [begin,end] expression and a periodic expression, P. The meaning is that the authorization defined by P is valid in the specified interval. For example, ([1/1/99, 12/31/99], (M,T,W,Th,F), Engineering, Project1, write, +, Manager), would indicate that the Engineering role has the permission to write information in Project1 during weekdays in 1999, and this authorization has been granted by the role Manager. In case of conflicts between positive and negative authorizations, the authors use the denials-take-precedence principle. Derivation rules allow the derivation of new authorizations starting from existing rules, that is, they correspond to the derivation of implicit authorizations. The paper discusses the problem of generating a unique set of valid authorizations, starting from a set of authorizations. Validation of requests according to the authorizations is also considered. Finally, the effect of authorization updates, including administration and implementation aspects, is discussed. This paper is a complete and lucid treatment of this topic. Its rigor and clarity, along with a good set of examples, make this complex subject understandable. While the derivations of the formal expressions are quite complex, it is not necessary to understand them to use the results. This work is required reading for anybody considering temporal aspects of security.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader