Abstract
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Apache http server version 2.0., http://www.apache.org/docs-2.0/misc/tutorials.html
Bettini, C., Jajodia, S., Wang, S., Wijesekera, D.: Provisions and obligations in policy rule management and security applications. In: Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China (August 2002)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming: Issues in Distributed and Mobile Object Systems. LNCS State-ofthe- Art series. Springer, Heidelberg (1998)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposiumon Security and Privacy, Oakland, CA, USA (May 1996)
Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security 5(1), 1–35 (2002)
Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security 10(3), 241–272 (2002)
Box, D., et al.: Web services policy framework (WS-Policy) version 1.1 (May 2003), http://msdn.microsoft.com/library/en-us/dnglobspec/html/ws-policy.asp
Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: Referee: trust management forweb applications. World Wide Web Journal 2(3), 706–734 (1997)
Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the semantic web. In: Proc. of the International Conference on Web Engineering, Munich, Germany (July 2004)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC) 5(2), 169–202 (2002)
Date, C.J.: An Introduction to Database Systems, 6th edn. Addison-Wesley, Reading (1995)
DeTreville, J.: Binder, a logic-based security language. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2002)
Dovier, A., Piazza, C., Pontelli, E., Rossi, G.: Sets and constraints logic programming. ACM Transactions of Programming Languages and Systems 22(5), 861–931 (2000)
Farrell, S., Housley, R.: An internet attribute certificate profile for authorization. RFC 3281 (April 2002)
Fernandez, E.B., Gudes, E., Song, H.: A model for evaluation and administration of security in object-oriented databases. IEEE Transaction on Knowledge and Data Engineering 6(2), 275–292 (1994)
Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. of the 5th International Conference and Symposium on Logic Programming, pp. 1070–1080. MIT Press, Cambridge (1988)
Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. In: Ghosh, A. (ed.) E-Commerce Security and Privacy, pp. 133–159. Kluwer Academic Publishers, Boston (2001)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)
Jim, T.: Sd3: A trust management system with certified evaluation. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2001)
Kudoh, M., Hirayama, Y., Hada, S., Vollschwitz, A.: Access control specification based on policy evaluation and enforcement model and specification language. In: Symposium on Cryptograpy and Information Security, SCIS 2000 (2000)
Landwehr, C.E.: Formal models for computer security. ACM Computing Surveys 13(3), 247–278 (1981)
Li, N., Grosof, B.N., Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security 6(1), 128–171 (2003)
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust-management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol. 2562, pp. 58–73. Springer, Heidelberg (2002)
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2002)
Lunt, T.: Access control policies: Some unanswered questions. In: IEEE Computer Security Foundations Workshop II, Franconia, NH, June 1988, pp. 227–245 (1988)
OASIS. eXtensible Access Control Markup Language (XACML) Version 1.0 (2003), http://www.oasis-open.org/committees/xacml
OASIS. Security Assertion Markup Language (SAML) V1.1 (2003), http://www.oasis-open.org/committees/security/
OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 (2004), http://www.oasis-open.org/committees/xacml
Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A model of authorization for next-generation database systems. ACM TODS 16(1), 89–131 (1991)
Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 137. Springer, Heidelberg (2001)
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA (June 2002)
Shen, H., Dewan, P.: Access control for collaborative environments. In: Proc. Int. Conf. on Computer Supported Cooperative Work, November 1992, pp. 51–58 (1992)
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA (October 2004)
Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Transactions on Information and System Security 6(2), 286–325 (2003)
Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6, 1–42 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De Capitani di Vimercati, S., Samarati, P., Jajodia, S. (2005). Policies, Models, and Languages for Access Control. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2005. Lecture Notes in Computer Science, vol 3433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31970-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-31970-2_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25361-7
Online ISBN: 978-3-540-31970-2
eBook Packages: Computer ScienceComputer Science (R0)