Usage control in computer security: A survey

被引:70
作者
Lazouski, Aliaksandr [1 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
机构
[1] Ist Informat & Telemat, Consiglio Nazl Ricerche, Via G Moruzzi 1, Pisa, Italy
关键词
D O I
10.1016/j.cosrev.2010.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting access to digital resources is one of the fundamental problems recognized in computer security. As yet it remains a challenging problem to work out, starting from the design of a system until its implementation. Access control is defined as the ability to permit or deny access to a particular resource (object) by a particular entity (subject). Three most widely used traditional access control models are: Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC). Traditional access control solutions do not respond adequately to new challenges addressed by modern computer systems. Today highly distributed, network-connected, heterogeneous and open computing environment requires a fine-grained, flexible, persistent and continuous model for protecting the access and usage of digital resources. This paper surveys the literature on Usage Control (UCON) model proposed by Park and Sandhu (2002) [1], Park (2003) [2] and Zhang (2006) [3]. Usage control is a novel and promising approach for access control in open, distributed, heterogeneous and network-connected computer environments. It encompasses and enhances traditional access control models, Trust Management (TM) and Digital Rights Management (DRM), and its main novelties are mutability of attributes and continuity of access decision evaluation. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:81 / 99
页数:19
相关论文
共 72 条
  • [1] Agreiter B, 2007, SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, P18
  • [2] Alam M., 2008, P 2008 ACM S INF COM, V8, P245
  • [3] Alam M, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P175
  • [4] A survey of trust in computer science and the Semantic Web
    Artz, Donovan
    Gil, Yolanda
    [J]. JOURNAL OF WEB SEMANTICS, 2007, 5 (02): : 58 - 71
  • [5] Baiardi F, 2004, LECT NOTES COMPUT SC, V3292, P123
  • [6] Barka E., 2008, Journal of Computer Systems, Networks, and Communications, V2008, DOI 10.1155/2008/380468
  • [7] Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
  • [8] Bettini C., 2002, POLICY 02
  • [9] Access control: principles and solutions
    di Vimercati, SD
    Paraboschi, S
    Samarati, P
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05) : 397 - 421
  • [10] Ding Y., 2008, ADV SOFTWARE ENG ITS, P182, DOI DOI 10.1109/ASEA.2008.14