Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Requirements for scalable access control and security management architectures

Published: 01 May 2007 Publication History

Abstract

Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end design principle) has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access-control policies and mechanisms. Yet management of security is becoming an increasingly challenging problem in no small part due to scaling up of measures such as number of users, protocols, applications, network elements, topological constraints, and functionality expectations.
In this article, we discuss scalability challenges for traditional access-control mechanisms at the architectural level and present a set of fundamental requirements for authorization services in large-scale networks. We show why existing mechanisms fail to meet these requirements and investigate the current design options for a scalable access-control architecture.
We argue that the key design options to achieve scalability are the choice of the representation of access control policy, the distribution mechanism for policy, and the choice of the access-rights revocation scheme. Although these ideas have been considered in the past, current access-control systems in use continue to use simpler but restrictive architectural models. With this article, we hope to influence the design of future access-control systems towards more decentralized and scalable mechanisms.

References

[1]
Bartal, Y., Mayer, A., Nissim, K., and Wool, A. 1999. Firmato: A novel firewall management toolkit. In Proceedings of the 1999 IEEE Symposium on Security and Privacy. 17--31.
[2]
Bellovin, S. M. 1999. Distributed Firewalls. ;login: The USENIX Magazine (Special Issue on Security).
[3]
Bhatti, R., Ghafoor, A., Bertino, E., and Joshi, J. B. D. 2005. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inform. Syst. Secur. 8, 2 (May), 187--227.
[4]
Bonatti, P., di Vimercati, S. D. C., and Samarati, P. 2000. A modular approach to composing access policies. In Proceedings of Computer and Communications Security (CCS'00). 164--173.
[5]
Boyle, J., Cohen, R., Durham, D., Herzog, S., Rajan, R., and Sastry, A. 2000. The COPS (Common Open Policy Service) Protocol. Request for comments (proposed standard), Internet Engineering Task Force.
[6]
Bull, J., Gong, L., and Sollins, K. 1992. Towards security in an open systems Federation. In Lecture Notes in Computer Science. vol. 648. Springer-Verlag, 3--20.
[7]
Calhoun, P., Rubens, A., Akhtar, H., and Guttman, E. 1999. DIAMETER Base Protocol. Internet Draft, Internet Engineering Task Force.
[8]
Chinitz, J. and Sonnenberg, S. 1996. A transparent security framework for TCP/IP and Legacy applications. Tech. rep., Intellisoft Corp.
[9]
Clark, D. D. 1988. The design philosophy of the DARPA Internet protocols. In Proceedings of SIGCOMM 1988. 106--114.
[10]
Damianou, M. 2002. A policy framework for management of distributed systems. Ph.D. thesis Imperial College, University of London.
[11]
Ferraiolo, D. F. and amd S. Gavrila, G.-J. A. 2003. The role control center: Features and case studies. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT).
[12]
Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R. 2003. Role Based Access Control. Artech House.
[13]
Ferraiolo, D. F., Sandhu, R. S., Gavrila, S., Kuhn, D. R., and Chandramouli, R. 2001. Proposed NIST standard for role-based access control. ACM Trans. Inform. Syst. Secur. 4, 3, 224--274.
[14]
Guttman, J. D. 1997. Filtering postures: Local enforcement for global policies. In IEEE Security and Privacy Conference, Oakland, CA. 120--129.
[15]
Hale, J., Galiasso, P., Papa, M., and Shenoi, S. 1999. Security policy coordination for heterogeneous information systems. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC).
[16]
Hayton, R., Bacon, J., and Moody, K. 1998. Access control in an open distributed environment. In IEEE Symposium on Security and Privacy, Oakland, CA.
[17]
Hinrichs, S. 1999. Policy-based management: Bridging the gap. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC).
[18]
Howard, J. D. 1997. An analysis of security on the Internet 1989--1995. Ph.D. thesis. Carnegie Mellon University.
[19]
Ioannidis, S., Keromytis, A., Bellovin, S., and Smith, J. 2000. Implementing a distributed firewall. In Proceedings of Computer and Communications Security (CCS'00). 190--199.
[20]
Keromytis, A. D. 2001. Strongman: A scalable solution to trust management in networks. Ph.D. thesis, University of Pennsylvania, Philadelphia, PA.
[21]
Keromytis, A. D., Ioannidis, S., Greenwald, M. B., and Smith, J. M. 2003. The STRONGMAN architecture. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III). 178--188.
[22]
Lampson, B. 1971. Protection. In Proceedings of the 5th Princeton Symposium on Information Sciences and Systems. 473--443.
[23]
Lampson, B. 1974. Protection. Operat. Syst. Rev. 8, 1 (Jan), 18--24.
[24]
Miller, S. P., Neuman, B. C., Schiller, J. I., and Saltzer, J. H. 1987. Kerberos authentication and authorization system. Tech. rep., MIT.
[25]
Molitor, A. 1995. An architecture for advanced packet filtering. In Proceedings of the 5th USENIX UNIX Security Symposium.
[26]
Network Wizards. Internet Domain Survey. http://www.isc.org/ds.
[27]
RFC Editor. RFCs issued by year. http://www.rfceditor.org/num_rfc_year.html.
[28]
Rigney, C., Rubens, A., Simpson, W., and Willens, S. 1997. Remote Authentication Dial In User Service (RADIUS). Request for Comments (Proposed Standard) 2138, Internet Engineering Task Force.
[29]
Saltzer, J. H., Reed, D. P., and Clark, D. D. 1984. End-to-end arguments in system design. ACM Trans. on Comput. Syst. 2, 4 (Nov), 277--288.
[30]
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb), 38--47.
[31]
Sandhu, R. S. and Park, J. S. 1998. Decentralized user-role assignment for web-based intranets. In ACM Workshop on Role-Based Access Control. 1--12.
[32]
Telcordia Technologies. Evaluating the size of the Internet. http://www.netsizer.com/.
[33]
Thomsen, D., O'Brien, D., and Bogle, J. 1998. Role based access control framework for network enterprises. In Proceedings of the 14th Annual Computer Security Applications Conference.
[34]
Thomsen, D., O'Brien, R., and Payne, C. 1999. Napoleon network application policy environment. In Proceedings of the 4th ACM Workshop on Role-Based Acess Control (RBAC). 145--152.
[35]
Trostle, J., Kosinovsky, I., and Swift, M. M. 2001. Implementation of crossrealm referral handling in the MIT Kerberos client. In Proceedings of the Network and Distributed System Security Symposium (SNDSS). 109--124.
[36]
Vandenwauver, M., Claessens, J., Moreau, W., Vaduva, C., and Maier, R. 1999. Why enterprises need more than firewalls and intrusion detection systems. In IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99). Stanford, CA. IEEE Computer Society, 152--7.
[37]
Westerlund, A. and Danielsson, J. 2001. Heimdal and Windows 2000 Kerberos---How to get them to play together. In Proceedings of the USENIX Annual Technical Conference, Freenix Track. 267--272.
[38]
Wobber, E., Abadi, M., Burrows, M., and Lampson, B. 1994. Authentication in the Taos operating system. ACM Trans. Comput. Syst. 12, 1 (Feb), 3--32.
[39]
Wool, A. 2001. Architecting the Lumeta firewall analyzer. In Proceedings of the 10th USENIX Security Symposium. 85--97.

Cited By

View all
  • (2025)A comprehensive review of usage control frameworksComputer Science Review10.1016/j.cosrev.2024.10069856(100698)Online publication date: May-2025
  • (2024)End to End secure data exchange in value chains with dynamic policy updatesFuture Generation Computer Systems10.1016/j.future.2024.04.053158:C(333-345)Online publication date: 1-Sep-2024
  • (2022)Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature ReviewJournal of Cybersecurity and Privacy10.3390/jcp20100082:1(107-123)Online publication date: 4-Mar-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 7, Issue 2
May 2007
152 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/1239971
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2007
Published in TOIT Volume 7, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Large-scale systems
  2. access control
  3. authorization
  4. credentials
  5. delegation
  6. distributed systems
  7. security policy
  8. trust management

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)A comprehensive review of usage control frameworksComputer Science Review10.1016/j.cosrev.2024.10069856(100698)Online publication date: May-2025
  • (2024)End to End secure data exchange in value chains with dynamic policy updatesFuture Generation Computer Systems10.1016/j.future.2024.04.053158:C(333-345)Online publication date: 1-Sep-2024
  • (2022)Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature ReviewJournal of Cybersecurity and Privacy10.3390/jcp20100082:1(107-123)Online publication date: 4-Mar-2022
  • (2018)ORGODEX: Authorization as a service (AaaS)2018 Annual IEEE International Systems Conference (SysCon)10.1109/SYSCON.2018.8369532(1-8)Online publication date: May-2018
  • (2018)ORGODEX: Service Portfolios for the Cloud2018 IEEE 11th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD.2018.00128(887-890)Online publication date: Jul-2018
  • (2017)Symbolically analyzing security protocols using tamarinACM SIGLOG News10.1145/3157831.31578354:4(19-30)Online publication date: 3-Nov-2017
  • (2017)Undecidability results for probabilistic automataACM SIGLOG News10.1145/3157831.31578334:4(10-17)Online publication date: 3-Nov-2017
  • (2017)Revisiting the Paxos FoundationsACM SIGOPS Operating Systems Review10.1145/3139645.313965651:1(67-71)Online publication date: 11-Sep-2017
  • (2016)A generic Kerberos-based access control system for the cloudAnnals of Telecommunications10.1007/s12243-016-0534-771:9-10(555-567)Online publication date: 6-Jul-2016
  • (2015)A novel evaluation criteria to cloud based access control modelsProceedings of the 2015 11th International Conference on Innovations in Information Technology (IIT)10.1109/INNOVATIONS.2015.7381517(68-73)Online publication date: 1-Nov-2015
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media