Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 227–242Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
Towards a Times-Based Usage Control Model

Towards a Times-Based Usage Control Model

  • Baoxian Zhao1,
  • Ravi Sandhu2,
  • Xinwen Zhang3 &
  • …
  • Xiaolin Qin4 
  • Conference paper
  • 1149 Accesses

  • 3 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

Modern information systems require temporal and privilege-consuming usage of digital objects. To meet these requirements, we present a new access control model–Times-based Usage Control (TUCON). TUCON extends traditional and temporal access control models with times-based usage control by defining the maximum times that a privilege can be exercised. When the usage times of a privilege is consumed to zero or the time interval of the usage is expired, the privilege exercised on the object is automatically revoked by the system. Formal definitions of TUCON actions and rules are presented in this paper, and the implementation of TUCON is discussed.

Keywords

  • Access Control
  • Usage Control
  • Times-based Usage Control
  • TUCON
  • Authorization

Chapter PDF

Download to read the full chapter text

References

  1. Gal, A., Atluri, V.: An Authorization Model for temporal Data. ACM Transactions on Information and System Security 5(1) (Feburary 2002)

    Google Scholar 

  2. Lampson, B.W.: Protection. 5th Princeton Symposium on Information Science and Systems (1971), Reprinted in ACM Operating Systems Review, 8(1), 18-24 (1974)

    Google Scholar 

  3. Landwehr, C.: Protection (Security) Models and Policy. In: The Computer Science and Engineering Handbook, pp. 1914–1928. CRC Press, USA (1997)

    Google Scholar 

  4. Bell, D.E., Lapadula, L.J.: Secure computer systems: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306,The Mitre Corporation, Bedford, MA (March 1975)

    Google Scholar 

  5. Denning, D.E.: A lattice Model of secure information flow. Communications of ACM 19(5), 236–243 (1976)

    CrossRef  MathSciNet  MATH  Google Scholar 

  6. Downs, D.D., Rub, J.R., Kung, K.C, Jordan, C.S.: Issues in discretionary access control. In: The procceding of IEEE Symposium on Research in Security and Privacy, pp. 208–218. IEEE Press, NJ, New York (1985)

    Google Scholar 

  7. Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. CCS 1994, l/94 Fairfax Va, USA (1994)

    Google Scholar 

  8. Bertino, E., Bettini, C., Samarati, P.: A Temporal Access Control Mechanism for Database Systems. IEEE Transactions on Knowledge and DataEngineering 8(1) (Feburary 1996)

    Google Scholar 

  9. Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Transactionon Database Systems 23(3) (September 1998)

    Google Scholar 

  10. Bertino, E., Bonatti, P.A, Ferrari, E.: TRBAC: A Temporal Role-based Access Control Model. ACM Transactionon on Information and System Security 4(3), 191–233 (2001)

    CrossRef  Google Scholar 

  11. Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of WWW ’10, pp. 514-525 (2001)

    Google Scholar 

  12. Graham, G.S., Denning, P.J.: Protection - Principles and Practice. In: Proceedings of the AFIPS Srping Joint Computer Conference, vol. 40, pp. 417–429. AFIPS Press (May 16-18, 1972)

    Google Scholar 

  13. James, B.D., Joshi, E., Bertino, U., Latif, A., Ghafoo, A.: A Generalized Temporal Role-Based Access Control Model. IACM Transactionon on Knoledge and Data Engineering 17(1), 4–23 (2005)

    CrossRef  Google Scholar 

  14. Park, J., Zhang, X., Sandhu, R.: The Usage Control Model. In: ACM Transactions on Information and Systems Security, ACM Press, New York (Feburary 2004)

    Google Scholar 

  15. Park, J., Zhang, X., Sandhu, R.: Attribute Mutability in Usage Control. IFIP WG 11.3 (November 2004)

    Google Scholar 

  16. Allen, J.F.: Maintaining Knowledge about Temporal Intervals. Communications of ACM 26 (November 1983)

    Google Scholar 

  17. Lo, J.: Denial of Service or ”Nuke” Attacks (March 12, 2005), http://www.irchelp.org/irchelp/nuke/

  18. Doerr, M., Yiortsou, A.: Implementing a Temporal Datatype. Technical Report ICS-FORTH/TR-236 (November 1998)

    Google Scholar 

  19. Kudo, M., Hada, S.: XML Document Security based on Provisional Authorization. In: CCS 2000, Athens, Greece, ACM Press, New York (2000)

    Google Scholar 

  20. Weaver, N.: Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.cs.berkeley.edu/nweaver/warhol.html

  21. Griffiths, G.S., Wade, B.W.: An authorization mechanism for a relational database system. ACM Transactions On Database Systems 1(3), 242–255 (1976)

    CrossRef  Google Scholar 

  22. Sandhu, R.: Access Control: The Neglected Frontier (Keynote Lecture). In: Australasian Conference on Information Security and Privacy (1996)

    Google Scholar 

  23. Sandhu, R.: Role Hierarchies and Constraints for Lattice-Based Access Controls. In: European Symposium on Research in Security and Privacy (1996)

    Google Scholar 

  24. Sandhu, R., Park, J.: Usage Control: A Vision for Next Generation Access Control. In: Models and Architectures for Computer Networks Security. The Second International Workshopon Mathematical Methods (2003)

    Google Scholar 

  25. Siewe, F., Cau, A., Zedan, H.: A Compositional Framework for Access Control Policies Enforcement. In: Proceeding of the ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York (2003)

    Google Scholar 

  26. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: IEEE Symposium On Research in Security and Privacy, Oakland, California (1997)

    Google Scholar 

  27. Zhang, X., Park, J., Parisi-Presicce, F., Sandhu, R.: A Logical Specification for Usage Control. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM Press, New York (June 2-4, 2004)

    Google Scholar 

  28. Zhang, X., Parisi-Presicce, F., Park, J., Sandhu, R.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security (TISSEC) 8(4), 351–387 (2005)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. George Mason University, Fairfax VA, USA

    Baoxian Zhao

  2. Institute for Cyber-Security Research, Univ. of Texas at San Antonio, USA

    Ravi Sandhu

  3. Samsung Information Systems America, San Jose, CA, USA

    Xinwen Zhang

  4. Nanjing University of Aeronautics and Astronautics, Nanjing, China

    Xiaolin Qin

Authors
  1. Baoxian Zhao
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Ravi Sandhu
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Xinwen Zhang
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Xiaolin Qin
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Zhao, B., Sandhu, R., Zhang, X., Qin, X. (2007). Towards a Times-Based Usage Control Model . In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_17

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature