Toward practical authorization-dependent user obligation systems

Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability properties that ensure failure to fulfill obligations is not due to lack of required authorizations. That work presented inconclusive and purely theoretical results concerning the feasibility of maintaining accountability in practice. The results of the current paper include algorithms and performance analysis that support the thesis that maintaining accountability in a reference monitor is reasonable in many applications.

Original languageEnglish
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages180-191
Number of pages12
DOIs
Publication statusPublished - 16 Jul 2010
Externally publishedYes
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: 13 Apr 201016 Apr 2010

Other

Other5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
CountryChina
CityBeijing
Period13/4/1016/4/10

Keywords

  • accountability
  • authorization systems
  • obligations
  • policy
  • RBAC

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Pontual, M., Chowdhury, O., Winsborough, W. H., Yu, T., & Irwin, K. (2010). Toward practical authorization-dependent user obligation systems. In Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 (pp. 180-191) https://doi.org/10.1145/1755688.1755711

Toward practical authorization-dependent user obligation systems. / Pontual, Murillo; Chowdhury, Omar; Winsborough, William H.; Yu, Ting; Irwin, Keith.

Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. 2010. p. 180-191.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pontual, M, Chowdhury, O, Winsborough, WH, Yu, T & Irwin, K 2010, Toward practical authorization-dependent user obligation systems. in Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. pp. 180-191, 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010, Beijing, China, 13/4/10. https://doi.org/10.1145/1755688.1755711
Pontual M, Chowdhury O, Winsborough WH, Yu T, Irwin K. Toward practical authorization-dependent user obligation systems. In Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. 2010. p. 180-191 https://doi.org/10.1145/1755688.1755711
Pontual, Murillo ; Chowdhury, Omar ; Winsborough, William H. ; Yu, Ting ; Irwin, Keith. / Toward practical authorization-dependent user obligation systems. Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. 2010. pp. 180-191
@inproceedings{61e4e60dba054a0cb66dc7e10ec8c7f2,
title = "Toward practical authorization-dependent user obligation systems",
abstract = "Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability properties that ensure failure to fulfill obligations is not due to lack of required authorizations. That work presented inconclusive and purely theoretical results concerning the feasibility of maintaining accountability in practice. The results of the current paper include algorithms and performance analysis that support the thesis that maintaining accountability in a reference monitor is reasonable in many applications.",
keywords = "accountability, authorization systems, obligations, policy, RBAC",
author = "Murillo Pontual and Omar Chowdhury and Winsborough, {William H.} and Ting Yu and Keith Irwin",
year = "2010",
month = "7",
day = "16",
doi = "10.1145/1755688.1755711",
language = "English",
isbn = "9781605589367",
pages = "180--191",
booktitle = "Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010",

}

TY - GEN

T1 - Toward practical authorization-dependent user obligation systems

AU - Pontual, Murillo

AU - Chowdhury, Omar

AU - Winsborough, William H.

AU - Yu, Ting

AU - Irwin, Keith

PY - 2010/7/16

Y1 - 2010/7/16

N2 - Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability properties that ensure failure to fulfill obligations is not due to lack of required authorizations. That work presented inconclusive and purely theoretical results concerning the feasibility of maintaining accountability in practice. The results of the current paper include algorithms and performance analysis that support the thesis that maintaining accountability in a reference monitor is reasonable in many applications.

AB - Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability properties that ensure failure to fulfill obligations is not due to lack of required authorizations. That work presented inconclusive and purely theoretical results concerning the feasibility of maintaining accountability in practice. The results of the current paper include algorithms and performance analysis that support the thesis that maintaining accountability in a reference monitor is reasonable in many applications.

KW - accountability

KW - authorization systems

KW - obligations

KW - policy

KW - RBAC

UR - http://www.scopus.com/inward/record.url?scp=77954470017&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954470017&partnerID=8YFLogxK

U2 - 10.1145/1755688.1755711

DO - 10.1145/1755688.1755711

M3 - Conference contribution

SN - 9781605589367

SP - 180

EP - 191

BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

ER -