Usage Control (UCON) enhances traditional access control introducing mutable attributes and continuous policy enforcement. UCON addresses security requirements of dynamic computer environments like Grid and Cloud, but also raises new challenges. This paper considers two problems of usage control.The first problem arises when a value of a mutable attribute required for an access decision is uncertain. The second problem questions when to retrieve fresh values of mutable attributes and to trigger the access reevaluation during the continuous control. We propose quantitative risk-based methods to tackle these problems. The authorization system grants the access if the security policy is satisfied and the risk level is acceptable. The authorization system retrieves fresh attribute values following the strategy which minimises the risk of the usage sessions. We integrate the authorization system based on the U-XACML language with quantitative methods for risk evaluation. We present the architecture, the implementation, and the evaluation of the overhead posed by the risk computation.

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies

Leanid Krautsevich;Aliaksandr Lazouski;Fabio Martinelli;Paolo Mori;Artsiom Yautsiukhin
2013

Abstract

Usage Control (UCON) enhances traditional access control introducing mutable attributes and continuous policy enforcement. UCON addresses security requirements of dynamic computer environments like Grid and Cloud, but also raises new challenges. This paper considers two problems of usage control.The first problem arises when a value of a mutable attribute required for an access decision is uncertain. The second problem questions when to retrieve fresh values of mutable attributes and to trigger the access reevaluation during the continuous control. We propose quantitative risk-based methods to tackle these problems. The authorization system grants the access if the security policy is satisfied and the risk level is acceptable. The authorization system retrieves fresh attribute values following the strategy which minimises the risk of the usage sessions. We integrate the authorization system based on the U-XACML language with quantitative methods for risk evaluation. We present the architecture, the implementation, and the evaluation of the overhead posed by the risk computation.
2013
Istituto di informatica e telematica - IIT
Inglese
International Conference on Computer Communications and Networks
978-1-4673-5774-6
Sì, ma tipo non specificato
30/07/2013
Nassau
authorisation
computer network security
cryptography
decision making
5
none
Leanid Krautsevich; Aliaksandr Lazouski; Fabio Martinelli; Paolo Mori; Artsiom Yautsiukhin
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/247495
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact