Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/507711.507722acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Towards usage control models: beyond traditional access control

Published: 03 June 2002 Publication History

Abstract

In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some time, there has been no systematic treatment so far. By unifying these three areas UCON offers a promising approach for the next generation of access control. Traditional access control has focused on a closed system where all users are known and primarily utilizes a server-side reference monitor within the system. Trust management has been introduced to cover authorization for strangers in an open environment such as the Internet. Digital rights management has dealt with client-side control of digital information usage. Each of these areas is motivated by its own target problems. Innovations in information technology and business models are creating new security and privacy issues which require elements of all three areas. To deal with these in a systematic unified manner we propose the new UCON model. UCON enables finer-grained control over usage of digital objects than that of traditional access control policies and models. For example, print once as opposed to unlimited prints. Unlike traditional access control or trust management, it covers both centrally controllable environment and an environment where central control authority is not available. UCON also deals with privacy issues in both commercial and non-commercial environments. In this paper we first discuss access control, trust management, and digital rights management and describe general concepts of UCON in the information security discipline. Then we define components of the UCON model and discuss how authorizations and access controls can be applied in the UCON model. Next we demonstrate some applications of the UCON model and develop further details. We use several examples during these discussions to show the relevance and validity of our approach. Finally we identify some open research issues.

References

[1]
Baker, Dixie. et al., "PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain", Proceedings of the Annual Computer Security Applications Conference, 1997.
[2]
Bell, D., and La Padula, L., "Secure Computer Systems: Mathematical Foundations and Model", MITER Report, MTR 2547 v2, Nov. 1973.
[3]
Blaze, Matt., J. Feigenbaum and J. Lacy., "Decentralized Trust Management", Proceedings on IEEE Symposium on Security and Privacy, 1996.
[4]
ContentsGuard Inc., "XrML: Extensible rights Markup Language", 2000, Online, Available: http://www.xrml.org.
[5]
Gunter, Carl., Stephen Weeks., and Andrew Wright., "Models and Languages for Digital Rights", Proc. of the Hawaii International Conference On System Sciences, 2001.
[6]
Department of HHS, "Standards for Privacy of Individually Identifiable Health Information", Online, Available: http://aspe.os.dhhs.gov/admnsimp/final/pvcguide1.htm, 2001.
[7]
Iannella, Renato., "Open Digital Rights Management", Position paper for the W3C DRM Workshop, 2000, Online, Available: http://www.iprsystems.com.
[8]
Iannella, Renato., "Open Digital Rights Language", 2000, Online, Available: http://odrl.net/odrl-08.pdf.
[9]
Kaplan, Marc. "IBM Cryptolopes, Superdistribution and Digital Right Management", 1996, Online, Available: http://www.research.ibm.com/people/k/kaplan/cryptolope-docs /crypap.html.
[10]
Sandhu, Ravi. "Lattice-Based Access Control Models." IEEE Computer, Volume 26, Number 11, November 1993, pages 9--19.
[11]
Sandhu, Ravi., and Samarati, Pierangela., "Access Control: Principles and Practice" IEEE Communication Magazine, pp 40--48, September 1994.
[12]
Sandhu, Ravi., Edward Coyne, Hal Feinstein and Charles Youman, "Role-Based Access Control Models." IEEE Computer, Volume 29, Number 2, February 1996, pages 38--47.
[13]
Schneck, Paul., "Persistent Access Control to Prevent Piracy of Digital Information", Proceedings of the IEEE, Vol. 87, No. 7, July 1999.
[14]
Sibert, Olin. et al. "The DigiBox: A self-Protecting Container for Information Commerce", Proceedings of USENIX Workshop on Electronic Commerce, New York, July, 1995.
[15]
Week, Stephen., "Understanding Trust Management Systems", Proceedings on IEEE Symposium on Security and Privacy, 2001.
[16]
Winsborough, William., Kent Seamons and Vicki Jones., "Automated Trust Negotiation", Proceedings of the DARPA Information Survivability Conference and Exposition 2000, 1999.

Cited By

View all
  • (2024)ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI SecurityIEEE Access10.1109/ACCESS.2024.344970212(119868-119883)Online publication date: 2024
  • (2024)Blockchain-based security framework for mitigating network attacks in multi-SDN controller environmentInternational Journal of Information Technology10.1007/s41870-024-01933-8Online publication date: 17-Jun-2024
  • (2024)Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future DirectionWireless Personal Communications10.1007/s11277-024-11568-4138:3(1671-1701)Online publication date: 1-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
June 2002
170 pages
ISBN:1581134967
DOI:10.1145/507711
  • General Chair:
  • Ravi Sandhu,
  • Program Chair:
  • Elisa Bertino
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SACMAT02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)81
  • Downloads (Last 6 weeks)9
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI SecurityIEEE Access10.1109/ACCESS.2024.344970212(119868-119883)Online publication date: 2024
  • (2024)Blockchain-based security framework for mitigating network attacks in multi-SDN controller environmentInternational Journal of Information Technology10.1007/s41870-024-01933-8Online publication date: 17-Jun-2024
  • (2024)Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future DirectionWireless Personal Communications10.1007/s11277-024-11568-4138:3(1671-1701)Online publication date: 1-Oct-2024
  • (2023)One-Factor Cancellable Fingerprint Template Protection Based on Index Self-EncodingJournal of Database Management10.4018/JDM.32154634:3(1-18)Online publication date: 25-Apr-2023
  • (2023)Overview of Internet of Medical Things Security Based on Blockchain Access ControlJournal of Database Management10.4018/JDM.32154534:3(1-20)Online publication date: 19-Apr-2023
  • (2023)An Evaluation Study of User Authentication in the Malaysian FinTech Industry With uAuth Security Analytics FrameworkJournal of Cases on Information Technology10.4018/JCIT.31870325:1(1-27)Online publication date: 2-Mar-2023
  • (2023)Intelligent Anti-Money Laundering Fraud Control Using Graph-Based Machine Learning Model for the Financial DomainJournal of Cases on Information Technology10.4018/JCIT.31666525:1(1-20)Online publication date: 20-Jan-2023
  • (2023)Collaborative Social Metric Learning in Trust Network for Recommender SystemsInternational Journal on Semantic Web & Information Systems10.4018/IJSWIS.31653519:1(1-15)Online publication date: 20-Jan-2023
  • (2023)Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion DetectionInternational Journal of Information Technologies and Systems Approach10.4018/IJITSA.31688916:1(1-19)Online publication date: 3-Feb-2023
  • (2023)Small Data Fusion Algorithm for Personalized Library RecommendationsInternational Journal of Information and Communication Technology Education10.4018/IJICTE.32277919:1(1-14)Online publication date: 12-May-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media