Title: Access Control and
1Access Control and Semantic Web
Technologies Ravi Sandhu Executive Director and
Endowed Chair Institute for Cyber
Security University of Texas at San Antonio
April 2008
2Theme
- Access control has always had to adjust as new
Information Technologies came into play - Operating systems
- Relational DBMSs
- Object oriented systems
- XML XACML, XRML
- Therefore, semantic web technologies will also
require a change in access control - But in the meantime access control itself has
evolved - DAC and MAC
- RBAC
- Trust Management, Obligations, Attribute-based
access control - Policy languages
- Usage control
- So semantic web technologies may also need to
change to accommodate some of these developments
3Theme
- Security itself has fundamentally changed
Enterprise security
Multi-party security
Black-and-white security
Gray security
Limited points of access
Access anytime anywhere
Engage with one service at a time
Engage with multiple services concurrently
4Models versus Policy Languages
- Access control models
- Built on abstractions
- Incomplete
- Testable for conformance
- Guidance for security architects
- DAC, MAC, RBAC, UCON
- Policy languages
- Specify what authorizations apply under various
circumstances - Industry standard XACML
- Academic implementation oriented Ponder
- Several theoretical languages
- Semantic web Kaos, Rei, Rein, KAoS
- Need synergy between these two streams of
research - Models provide a framework but are necessarily
incomplete - Languages by themselves provide no guidance or
framework
5Partners in Crime
Proceedings ACM Symposium on Access Control
Models and Technologies (SACMAT), 2008, to appear
6NIST RBAC Standard Model
7NIST RBAC Standard Model
8NIST RBAC Standard RBAC
9US Persons Role Hierarchy
10ROWLBAC 2 Approaches
11Common Elements
12Roles as Classes Role Hierarchies
13Roles as Classes SSD, DSD
14Roles as Classes Role-Permission
15Roles as Classes Enforcing DSD
16Roles as Values
17Roles as Values Hierarchical Roles
18Roles as Values SSD, DSD
19Roles as Values Role Permissions
20Roles as Values Enforcing RBAC
21ROWLBAC 2 Approaches
22The UCON Model
- unified model integrating
- authorization
- obligation
- conditions
- and incorporating
- continuity of decisions
- mutability of attributes
23UCON Extensions
- UCON future obligations
- UCON system obligations
24Unifying Policy Framework
25Unifying Policy Framework