Usage Control (UCON) enhances traditional access control introducing mutable attributes and continuous policy enforcement. UCON addresses security requirements of dynamic computer environments like Grid and Cloud, but also raises new challenges. This paper considers two problems of usage control.The first problem arises when a value of a mutable attribute required for an access decision is uncertain. The second problem questions when to retrieve fresh values of mutable attributes and to trigger the access reevaluation during the continuous control. We propose quantitative risk-based methods to tackle these problems. The authorization system grants the access if the security policy is satisfied and the risk level is acceptable. The authorization system retrieves fresh attribute values following the strategy which minimises the risk of the usage sessions. We integrate the authorization system based on the U-XACML language with quantitative methods for risk evaluation. We present the architecture, the implementation, and the evaluation of the overhead posed by the risk computation.

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies

Leanid Krautsevich;Aliaksandr Lazouski;Fabio Martinelli;Paolo Mori;Artsiom Yautsiukhin
2013

Abstract

Usage Control (UCON) enhances traditional access control introducing mutable attributes and continuous policy enforcement. UCON addresses security requirements of dynamic computer environments like Grid and Cloud, but also raises new challenges. This paper considers two problems of usage control.The first problem arises when a value of a mutable attribute required for an access decision is uncertain. The second problem questions when to retrieve fresh values of mutable attributes and to trigger the access reevaluation during the continuous control. We propose quantitative risk-based methods to tackle these problems. The authorization system grants the access if the security policy is satisfied and the risk level is acceptable. The authorization system retrieves fresh attribute values following the strategy which minimises the risk of the usage sessions. We integrate the authorization system based on the U-XACML language with quantitative methods for risk evaluation. We present the architecture, the implementation, and the evaluation of the overhead posed by the risk computation.
2013
Istituto di informatica e telematica - IIT
978-1-4673-5774-6
authorisation
computer network security
cryptography
decision making
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/247495
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact