Skip to main content

A Declarative Framework for Specifying andĀ Enforcing Purpose-Aware Policies

  • Conference paper
  • First Online:
Book cover Security and Trust Management (STM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9331))

Included in the following conference series:

Abstract

Purpose is crucial for privacy protection as it makes users confident that their personal data are processed as intended. Available proposals for the specification and enforcement of purpose-aware policies are unsatisfactory for their ambiguous semantics of purposes and/or lack of support to the run-time enforcement of policies.

In this paper, we propose a declarative framework based on a first-order temporal logic that allows us to give a precise semantics to purpose-aware policies and to reuse algorithms for the design of a run-time monitor enforcing purpose-aware policies. We also show the complexity of the generation and use of the monitor which, to the best of our knowledge, is the first such a result in literature on purpose-aware policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    docs.oasis-open.org/xacml/3.0/xacml-3.0-privacy-v1-spec-cd-03-en.pdf.

  2. 2.

    www.w3.org/Submission/2003/SUBM-EPAL-20031110.

  3. 3.

    http://www.smartcampuslab.it.

  4. 4.

    Given an n-ary relation R, we write \(R(e_1, ..., e_n)\) for \((e_1, ..., e_n)\in R\).

References

  1. Directive 95/46/ec of the european parliament and of the council of 24 october 1995. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML

  2. van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative workflows: balancing between flexibility and support. CS - R&D 23(2), 99ā€“113 (2009)

    Google ScholarĀ 

  3. Arkoudas, K., Chadha, R., Chiang, C.J.: Sophisticated access control via SMT and logical frameworks. Proc. ACM TISSEC 16(4), 17 (2014)

    Google ScholarĀ 

  4. Barth, A., Datta, A., Mitchell, J.C., Sundaram, S.: Privacy and utility in business processes. In: Proceedings of 20th IEEE Computer Security Foundations Symposium, July 2007

    Google ScholarĀ 

  5. Basin, D., Klaedtke, F., MĆ¼ller, S.: Monitoring security policies with metric first-order temporal logic. In: Proceedings of ACM SACMAT, pp. 23ā€“34. ACM, New York, USA (2010)

    Google ScholarĀ 

  6. Basin, D., Burri, S.J., Karjoth, G.: Dynamic enforcement of abstract separation of duty constraints. ACM TISSeC 15(3), 13:1ā€“13:30 (2012)

    ArticleĀ  Google ScholarĀ 

  7. Bauer, A., KĆ¼ster, J.-C., Vegliach, G.: From propositional to first-order monitoring. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 59ā€“75. Springer, Heidelberg (2013)

    ChapterĀ  Google ScholarĀ 

  8. Bertolissi, C., dos Santos, D.R., Ranise, S.: Automated synthesis of run-time monitors to enforce authorization policies in business processes. In: Asia CCS. ACM (2015)

    Google ScholarĀ 

  9. Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the ACM SACMAT, pp. 102ā€“110. ACM (2005)

    Google ScholarĀ 

  10. Byun, J., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603ā€“619 (2008)

    ArticleĀ  Google ScholarĀ 

  11. Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A privacy-aware access control system. J. Comput. Secur. (JCS) 16(4), 369ā€“392 (2008)

    ArticleĀ  Google ScholarĀ 

  12. Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: Proceedings of ACM SACMAT, pp. 38ā€“47. ACM (2005)

    Google ScholarĀ 

  13. Crampton, J., Huth, M., Kuo, J.P.: Authorized workflow schemas: deciding realizability through \({\sf LTL(F)}\) model checking. Int. J. Soft. Tools Technol. Transf. (STTT) 16(1), 31ā€“48 (2014)

    ArticleĀ  Google ScholarĀ 

  14. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P.: Access control policies and languages. IJCSE 3(2), 94ā€“102 (2007)

    ArticleĀ  Google ScholarĀ 

  15. De Giacomo, G., De Masellis, R., Grasso, M., Maggi, F.M., Montali, M.: Monitoring business metaconstraints based on LTL and LDL for finite traces. In: Sadiq, S., Soffer, P., Vƶlzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 1ā€“17. Springer, Heidelberg (2014)

    Google ScholarĀ 

  16. De Giacomo, G., De Masellis, R., Montali, M.: Reasoning on LTL on finite traces: Insensitivity to infiniteness. In: Proceedings of AAAI Conference on AI, pp. 1027ā€“1033 (2014)

    Google ScholarĀ 

  17. De Masellis, R., Ghidini, C., Ranise, S.: A declarative framework for specifying and enforcing purpose-aware policies (2015). arxiv.org/abs/1507.08153

  18. De Masellis, R., Maggi, F.M., Montali, M.: Monitoring data-aware business constraints with finite state automata. In: Proceedings of ICSSP, pp. 134ā€“143 (2014)

    Google ScholarĀ 

  19. De Masellis, R., Su, J.: Runtime enforcement of first-order LTL properties on data-aware business processes. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 54ā€“68. Springer, Heidelberg (2013)

    ChapterĀ  Google ScholarĀ 

  20. Jafari, M., Safavi-Naini, R., Sheppard, N.P.: Enforcing purpose of use via workflows. In: Proceedings of WPES, pp. 113ā€“116 (2009)

    Google ScholarĀ 

  21. Jafari, M., Safavi-Naini, R., Fong, P.W.L., Barker, K.: A framework for expressing and enforcing purpose-based privacy policies. ACM Trans. Inf. Syst. Secur. 17(1), 3:1ā€“3:31 (2014)

    ArticleĀ  Google ScholarĀ 

  22. Krƶger, F., Merz, S.: Temporal Logic and State Systems. Texts in Theoretical Computer Science. An EATCS Series. Springer, Heidelberg (2008)

    MATHĀ  Google ScholarĀ 

  23. Li, N., Mitchell, J.C.: Datalog with constraints: a foundation for trust management languages. In: PADL 2003, pp. 58ā€“73 (2003)

    Google ScholarĀ 

  24. Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring business constraints with linear temporal logic: an approach based on colored automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132ā€“147. Springer, Heidelberg (2011)

    ChapterĀ  Google ScholarĀ 

  25. Masoumzadeh, A., Joshi, J.B.D.: PuRBAC: purpose-aware role-based access control. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1104ā€“1121. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  26. Mossakowski, T., Drouineaud, M., Sohr, K.: A temporal-logic extension of role-based access control covering dynamic separation of duties. In: Proceedings of TIME-ICTL, pp. 83ā€“90 (2003)

    Google ScholarĀ 

  27. P. Yang, X. Xie, I.R., Lu, S.: Satisfiability analysis of workflows with control-flow patterns and authorization constraints. IEEE TSC 99 (2013)

    Google ScholarĀ 

  28. Petković, M., Prandi, D., Zannone, N.: Purpose control: did you process the data for the intended purpose? In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 145ā€“168. Springer, Heidelberg (2011)

    ChapterĀ  Google ScholarĀ 

  29. Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Comm. ACM 49, 39ā€“44 (2006)

    ArticleĀ  Google ScholarĀ 

  30. Qun, N., Elisa, B., Jorge, L., Carolyn, B., Karat, C.M., Alberto, T.: Privacy-aware role-based access control. TISSeC 13, 1ā€“31 (2010)

    Google ScholarĀ 

  31. Rath, A.T., Colin, J.N.: Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment. In: Proceedings of ICUIMC, pp. 14:1ā€“14:8. ACM (2014)

    Google ScholarĀ 

  32. Schneider, F.B.: Enforceable security policies. TISSeC 3, 30ā€“50 (2000)

    ArticleĀ  Google ScholarĀ 

  33. Tschantz, M.C., Datta, A., Wing, J.M.: Formalizing and enforcing purpose restrictions in privacy policies. In: IEEE Symposium on Security and Privacy, pp. 176ā€“190 (2012)

    Google ScholarĀ 

  34. Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. TISSeC 13, 40:1ā€“40:35 (2010)

    Google ScholarĀ 

  35. Westergaard, M., Maggi, F.M.: Declare: A tool suite for declarative workflow modeling and enactment. In: Proceedings of BPM (2011)

    Google ScholarĀ 

  36. Westin, A.: Privacy and Freedom. Atheneum, New York (1968)

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Riccardo De Masellis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

De Masellis, R., Ghidini, C., Ranise, S. (2015). A Declarative Framework for Specifying andĀ Enforcing Purpose-Aware Policies. In: Foresti, S. (eds) Security and Trust Management. STM 2015. Lecture Notes in Computer Science(), vol 9331. Springer, Cham. https://doi.org/10.1007/978-3-319-24858-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24858-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24857-8

  • Online ISBN: 978-3-319-24858-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics