Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Rumpole: An Introspective Break-Glass Access Control Language

Published: 15 August 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be permitted. For example, predicting and correctly encoding all emergency and exceptional situations is impractical. Traditional access control models simply deny all requests that are not permitted, and in doing so may cause unpredictable and unacceptable consequences. To overcome this issue, break-glass access control models permit a subject to override an access control denial if he accepts a set of obligatory actions and certain override conditions are met. Existing break-glass models are limited in how the override decision is specified. They either grant overrides for a predefined set of exceptional situations, or they grant unlimited overrides to selected subjects, and as such, they suffer from the difficulty of correctly encoding and predicting all override situations and permissions. To address this, we develop Rumpole, a novel break-glass language that explicitly represents and infers knowledge gaps and knowledge conflicts about the subject's attributes and the contextual conditions, such as emergencies. For example, a Rumpole policy can distinguish whether or not it is known that an emergency holds. This leads to a more informed decision for an override request, whereas current break-glass languages simply assume that there is no emergency if the evidence for it is missing. To formally define Rumpole, we construct a novel many-valued logic programming language called Beagle. It has a simple syntax similar to that of Datalog, and its semantics is an extension of Fitting's bilattice-based semantics for logic programs. Beagle is a knowledge non-monotonic langauge, and as such, is strictly more expressive than current many-valued logic programming languages.

    References

    [1]
    R. J. Anderson. 1996. A security policy model for clinical information systems. Proceedings of the IEEE Symposium on Security and Privacy. 30--43.
    [2]
    Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone W. Grandison, Sushil Jajodia, and Pierangela Samarati. 2010. Access control for smarter healthcare using policy spaces. Comput. Secu. 29 (2010), 848--858.
    [3]
    Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, and Pierangela Samarati. 2008. Regulating exceptions in healthcare using policy spaces. In Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec). 254--267.
    [4]
    Ofer Arieli and Arnon Avron. 1998. The value of the four values. Artif. Intell. 102 (1998), 97--141.
    [5]
    A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. In Proceedings of the IEEE Symposium on Security and Privacy.
    [6]
    N. D. Belnap. 1977. A useful four-valued logic. In Modern Uses of Multiple-Valued Logics, Springer, 8--37.
    [7]
    Claudio Bettini, Sushil Jajodia, X. Sean Wang, and Duminda Wijesekera. 2002. Provisions and obligations in policy management and security applications. In Proceedings of the 28th International Conference on Very Large Data Bases. 502--513.
    [8]
    Achim D. Brucker and Helmut Petritsch. 2009. Extending access control models with break-glass. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. 197--206.
    [9]
    Glenn Bruns and Michael Huth. 2008. Access-control policies via Belnap logic: Effective and efficient composition and analysis. In Proceedings of the IEEE Computer Security Foundations Symposium. 163--176.
    [10]
    J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, and Gabriele Lenzini. 2007. Audit-based compliance control. Int. J. Inf. Sec. 6, 2--3 (2007), 133--151.
    [11]
    S. Ceri, G. Gottlob, and L. Tanca. 1989. What you always wanted to know about Datalog (and never dared to ask). IEEE Trans. Knowl. Data Eng. 1 (1989), 146--166.
    [12]
    Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, and William H. Winsborough. 2013. Privacy promises that can be kept: A policy analysis method with application to the HIPAA privacy rule. In Proceedings of the 18th ACM Symposium on Access Control Models and Technologies. 3--14.
    [13]
    Jason Crampton and Charles Morisset. 2012. PTaCL: A language for attribute-based access control in open systems. In Proceedings of the Conference on Principles of Security and Trust (POST). 390--409.
    [14]
    Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. 2001. Complexity and expressive power of logic programming. ACM Comput. Surv. 33 (2001), 374--425.
    [15]
    Sandro Etalle and William H. Winsborough. 2007. A posteriori compliance control. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT). 11--20.
    [16]
    A. Ferreira, D. Chadwick, P. Farinha, R. Correia, Gansen Zao, R. Chilro, and L. Antunes. 2009. How to securely break into RBAC: The BTG-RBAC model. In Proceedings of the Computer Security Applications Conference.
    [17]
    Melvin Fitting. 1990. Bilattices in logic programming. In Proceedings of the 20th International Symposium on Multiple-Valued Logic. 238--246.
    [18]
    Melvin Fitting. 1991. Bilattices and the semantics of logic programming. J. Log. Program. 11 (1991), 91--116.
    [19]
    Matthew Ginsberg. 1988. Multivalued logics: A uniform approach to inference in artificial intelligence. Comput. Intel. 4 (1988), 265--316.
    [20]
    S. K. S. Gupta, T. Mukherjee, and K. Venkatasubramanian. 2006. Criticality aware access control model for pervasive applications. In Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PERCOM'06). IEEE Computer Society, 251--257.
    [21]
    Ragib Hasan and Marianne Winslett. 2011. Efficient audit-based compliance for relational data retention. In Proceedings of the 6th ACM Symposium Information, Computer and Communication Security (ASIACCS). 238--248.
    [22]
    HHS. 2003. Summary of the HIPAA Privacy Rule. United States Department of Health & Human Services (2003). http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary.
    [23]
    Keith Irwin, Ting Yu, and William H. Winsborough. 2006. On the modeling and analysis of obligations. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 134--143.
    [24]
    Yann Le Gall, Adam J. Lee, and Apu Kapadia. 2012. PlexC: A policy language for exposure control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT'12). 219--228.
    [25]
    Adam J. Lee, Jodie P. Boyer, Lars E. Olson, and Carl A. Gunter. 2006. Defeasible security policy composition for Web services. In Proceedings of the 4th ACM Workshop on Formal Methods in Security. 45--54.
    [26]
    Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, and Dan Lin. 2009. Access control policy combining: Theory meets practice. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09). ACM, 135--144.
    [27]
    Jim J. Longstaff, Mike A. Lockyer, and M. G. Thick. 2000. A model of accountability, confidentiality and override for healthcare and other applications. In Proceedings of the ACM Workshop on Role-Based Access Control. 71--76.
    [28]
    Srdjan Marinovic, Robert Craven, Jiefei Ma, and Naranker Dulay. 2011. Rumpole: A flexible break-glass access control model. In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT). 73--82.
    [29]
    NEMA. 2004. Break-Glass: An Approach to Granting Emergency Access to Healthcare Systems. White Paper, Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC).
    [30]
    Qun Ni, Elisa Bertino, and Jorge Lobo. 2008. An obligation model bridging access control policies and privacy policies. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT'08). ACM, New York, NY, 133--142.
    [31]
    Jaehong Park and Ravi Sandhu. 2004. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7, 1 (2004), 128--174.
    [32]
    Dean Povey. 2000. Optimistic security: A new access control paradigm. In Proceedings of the Workshop on New Security Paradigms (NSPW'09). ACM, New York, NY, 40--45.
    [33]
    Teodor C. Przymusinski. 1988a. On the relationship between logic programming and nonmonotonic reasoning. In Proceedings of the 7th National Conference on Artifical Intelligence (AAAI). 444--448.
    [34]
    Teodor C. Przymusinski. 1988b. Perfect model semantics. In Proceedings of the 5th International Conference and Symposium on Logic Programming (ICLP/SLP). 1081--1096.
    [35]
    R. Reiter. 1977. On closed world data bases. Technical Report. University of British Columbia, Vancouver, BC, Canada.
    [36]
    Erik Rissanen, Babak Sadighi Firozabadi, and Marek J. Sergot. 2004. Discretionary overriding of access control in the privilege calculus. In Formal Aspects in Security and Trust, 219--232.
    [37]
    Paul Ruet and François Fages. 1997. Combining explicit negation and negation by failure via Belnap's logic. Theor. Comput. Sci. 171 (1997), 61--75.
    [38]
    John S. Schlipf. 1995. Complexity and undecidability results for logic programming. Ann. Math. Artif. Intell. 15 (1995), 257--288.
    [39]
    V. S. Subrahmanian. 1999. Nonmonotonic logic programming. IEEE Trans. Knowl. Data Eng. 11, 1 (1999), 143--152.
    [40]
    Alfred Tarski. 1955. A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. 5, 2 (1955).
    [41]
    K. Twidle, E. Lupu, N. Dulay, and M. Sloman. 2008. Ponder2 - A policy environment for autonomous pervasive systems. In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks (POLICY'08). 245--246.
    [42]
    Allen Van Gelder, Kenneth A. Ross, and John S. Schlipf. 1991. The well-founded semantics for general logic programs. J. ACM 38, 3 (1991), 620--650.

    Cited By

    View all
    • (2022)Valued Authorization Policy Existence Problem: Theory and ExperimentsACM Transactions on Privacy and Security10.1145/352810125:4(1-32)Online publication date: 9-Jul-2022
    • (2022)Efficient ABAC based information sharing within MQTT environments under emergenciesComputers & Security10.1016/j.cose.2022.102829120(102829)Online publication date: Sep-2022
    • (2022)Advances on networked ehealth information access and sharingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108687204:COnline publication date: 26-Feb-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Information and System Security
    ACM Transactions on Information and System Security  Volume 17, Issue 1
    August 2014
    118 pages
    ISSN:1094-9224
    EISSN:1557-7406
    DOI:10.1145/2660572
    • Editor:
    • Gene Tsudik
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 August 2014
    Accepted: 01 May 2014
    Revised: 01 February 2014
    Received: 01 July 2013
    Published in TISSEC Volume 17, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Security
    2. access control
    3. break-glass access control
    4. logic programming
    5. many-valued logics

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Valued Authorization Policy Existence Problem: Theory and ExperimentsACM Transactions on Privacy and Security10.1145/352810125:4(1-32)Online publication date: 9-Jul-2022
    • (2022)Efficient ABAC based information sharing within MQTT environments under emergenciesComputers & Security10.1016/j.cose.2022.102829120(102829)Online publication date: Sep-2022
    • (2022)Advances on networked ehealth information access and sharingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108687204:COnline publication date: 26-Feb-2022
    • (2021) Nova: Value-based Negotiation of NormsACM Transactions on Intelligent Systems and Technology10.1145/346505412:4(1-29)Online publication date: 1-Aug-2021
    • (2021)Valued Authorization Policy Existence ProblemProceedings of the 26th ACM Symposium on Access Control Models and Technologies10.1145/3450569.3463571(83-94)Online publication date: 11-Jun-2021
    • (2019)A Rigorous Framework for Specification, Analysis and Enforcement of Access Control PoliciesIEEE Transactions on Software Engineering10.1109/TSE.2017.276564045:1(2-33)Online publication date: 1-Jan-2019
    • (2018)Augmenting Machine Learning with ArgumentationProceedings of the New Security Paradigms Workshop10.1145/3285002.3285005(1-11)Online publication date: 28-Aug-2018
    • (2018)Behavior analysis in the medical sectorProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167307(1637-1646)Online publication date: 9-Apr-2018
    • (2017)KONTProceedings of the Thirty-First AAAI Conference on Artificial Intelligence10.5555/3298483.3298671(3006-3012)Online publication date: 4-Feb-2017
    • (2017)Attribute Expressions, Policy Tables and Attribute-Based Access ControlProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078865(79-90)Online publication date: 7-Jun-2017
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media