Title: Formal Model and Analysis of Usage Control
1Formal Model and Analysis of Usage Control
- Dissertation defense
- Student Xinwen Zhang
- Director Ravi S. Sandhu
- Co-director Francesco Parisi-Presicce
- Department of Information and Software
Engineering - School of Information Technology and Engineering
- George Mason University, Fall 2005
2Outline
- Introduction
- Motivations Problem Statement
- Background
- Usage control and TLA
- A Formalization of UCON
- A logical model to formalize state transitions in
a single usage - Policy specification flexibility of the logical
model - Expressive Power of UCON
- A model to formalize the global effects of a
usage and accumulative results of a sequence of
usages - Relative expressive power between UCONA and
traditional access control models - Relative expressive power between UCONA and UCONB
- Safety Analysis of UCON
- Safety undecidability of the general UCONA model
- Safety decidable UCONA models
- Expressive power of safety decidable models
- Contribution Summary and Future Work
3Motivations Problem Statement
- Motivations of UCON
- A comprehensive unified model that
- fundamentally extends traditional access control
models - captures DRM and trust management systems
- A conceptual model has been presented by Park and
Sandhu. - Formalization of UCON Model is required
- for the precise semantics of the conceptual model
- for policy definition
- for the analysis of UCON properties.
- Two fundamental problems in access control
- Expressive Power
- Safety Analysis
4UCON Model (Park and Sandhu 2004)
- Attributes can be updated as side-effects of a
usage - pre, ongoing, post and updates
- Attribute Mutability
- Core models
- preA0, preA1, preA2, preA3, onAx, preBx, onBx
preCx onCx - A real model may be a combination of core models.
5An Example
- Resource-constrained access control
- Limited number (10) of ongoing accesses to a
single object - When 11th subject requesting new access, one
ongoing accessing will be revoked. - Different revocation policies
- By start time the longest ongoing usage is
revoked - By idle time the usage with the longest total
idle time is revoked - By total usage time the usage with the longest
accumulating usage time is revoked. - Need decision continuity, attribute mutability,
and ongoing access revocations
6Temporal Logic of Actions (Lamport 1994)
- Basic terms of TLA
- Variables and values
- State assignment of values to variables
- Predicates boolean expressions using variables
in a single state - Actions boolean expressions using variables in
two states. - Future temporal operators
- Past Temporal operators
7Logical Model of UCON Variables, States,
Predicates
- Variables
- Subject attributes role, group, clearance,
credit, etc. - Object attributes type, owner, access control
list, etc. - System attributes location, time, load, etc.
- A state of a UCON system is an assignment of
values to attributes. - Predicates boolean expressions built from
subject attributes, object attributes, and system
attributes in a single state. - Alice.credit gt 1000, file1.classification
secure - Dominate(Alice.clearance, file1.classification)
- (Bob, read) ? file2.ACL)
8Logical Model of UCON Actions
- Control actions
- Actions changing the usage state of a single
usage process (s,o,r) - 6 values of state(s,o,r)
- 5 actions
- Update actions
- s.credits.credit - 50.0
- Obligation actions
- Actions that have to be performed before or
during a usage - May or may not be performed by the requesting
subject and on the target object.
9Logical Model of UCON
- The logical model of a UCON system is a 5-tuple
(S, PA, PC, AA, AB) , where - S is a set of sequences of states of the system,
- PA is a finite set of authorization predicates
built from the attributes of subjects and
objects, - PC is a finite set of condition predicates built
from the system attributes, - AA is a finite set of control actions,
- AB is a finite set of obligation actions.
- A logic formula consisting of predicates,
actions, and logical and temporal operators
10Specification of Core Models
- Ongoing authorizations onA123
- Resource-constrained access control, revocation
by idle time - Object attribute
- Subject attributes status (with value of busy or
idle), idleTime
11Specify General Policies
12Specifying General Policies
- Completeness
- Any UCON policy can be specified by a non-empty
set of control rules and a set of update rules. - Soundness
- A non-empty set of control rules and a set of
update rules can be satisfied by at least one
UCON model.
13Policy Specification Flexibility
- RBAC models (RBAC0, RBAC1, RBAC2)
- Chinese Wall policies
- Dynamic separation of duty
- MAC policy with high watermark property
- Healthcare information systems with
authorizations and obligations
14Expressive Power Safety Analysis
- Expressive Power
- The flexibility to express policies for variant
requirements. - Comparing expressive power between access control
models - Safety problem
- By giving a system, specified by an initial state
and a scheme, is there a reachable state in which
a subject has a particular right on an object? - Expressive power and safety analysis are two
conflict problems for an access control model - In general, the more expressive power it has, the
harder it is to computationally carry out safety
analysis. - Examples HRU, SPM, and TAM
15Formal Model of preA preB
- To formalize the global effect of a single usage
process - Instead of the detailed state transitions in
single usage process by the logical model - A system state is (O, ?), where
- O is a set of objects
- ? O ? ATT ? dom(ATT) ? null
- S ? O
- Three primitive actions
- createObject, destroyObject, updateAttribute
- preA policy
16Formal Model of preA preB
- A UCON preA scheme is a 4-tuple (ATT, R, P, C),
where - ATT is a finite set of attribute names
- R is a finite set of rights,
- P is a finite set of predicates
- C is a finite set of policies
- A UCON preA system is specified by a preA scheme
and an initial state (O0, ?0). - A UCON preB scheme is a 5-tuple (ATT, R, P, B,
C), where - B is a finite set of obligation actions
- A UCON preB system is specified by a preB scheme
and an initial state (O0, ?0).
17Expressive Power of preA iTunes-like Systems
iTunes music store
User
Music file
Device
18Expressive Power of UCON preA
- The expressive power of UCON preA model has been
formally studied by comparing it with traditional
access control models - simulating the general SO-TAM model
- Simulating the general SO-ATAM model
Theorem UCON preA is more expressive than
TAM. UCON preA is at least as expressive as ATAM.
19Relative Expressive Power ofpreA preB
- Theorem
- UCON preA and preB have the same expressive
power. - A preA policy can be simulated by a preB policy.
- A preB policy can be simulated by a finite number
of preA policies.
20Safety Analysis of UCON preA
- Theorem
- The general preA model has undecidable safety.
- By reducing a general SO-TAM system to a preA
system - By simulating the operations of a general Turing
machine with a preA model.
21Safety Analysis of UCON preA
- Theorem
- The safety problem of a preA system is decidable
if - the value domain of each attribute is finite, and
- there is no creating policy in the scheme.
- The complexity of the safety problem is
- polynomial in the number of possible states of
the system. - NP-hard in number of policies in the scheme.
- Theorem
- The safety problem of a preA system is decidable
if - the attribute creation graph is acyclic, and
- the attribute update graph has no cycle
containing a create-parent attribute tuple, and - in each creating policy, both the parent's and
the child's attribute tuples are updated.
22Expressive Power of Decidable preA
- The decidable model can express an RBAC96 model
with URA97 scheme. - The decidable model can express DRM applications
with consumable rights.
23Contribution Summary
- A logical model of UCON is developed
- Precisely defining the semantics of the
conceptual model - Specifying policies for general UCON models with
completeness and soundness - Policy specification flexibility by defining
policies for various applications - Formal study of the expressive power of UCON preA
and preB - preA is at least as expressive as ATAM.
- preA and preB have the same expressive power.
- Safety analysis of UCON preA
- Safety undecidability of the general model
- Two safety decidable models with restrictions on
the general model - Expressive power of the decidable models by
simulating RBAC and DRM applications
24Future Work
- An administrative model of UCON
- Efficiently decidable UCON models
- Expressive power and safety analysis of UCON
ongoing models. - UCON architectures and mechanisms
25Related Publications
- Xinwen Zhang, Sejong Oh, and Ravi Sandhu, PBDM A
Flexible Delegation Model in RBAC, 8th ACM
Symposium on Access Control Models and
Technologies (SACMAT), 2003. - Xinwen Zhang, Jaehong Park, Francesco
Parisi-Presicce, and Ravi Sandhu, A Logical
Specification for Usage Control, ACM SACMAT,
2004. - Jaehong Park, Xinwen Zhang, and Ravi Sandhu,
Attribute Mutabiligy in Usage Control, Annual
IFIP WG 11.3 Working Conference on Data and
Applications Security, 2004. - Xinwen Zhang, Jaehong Park, Francesco
Parisi-Presicce, and Ravi Sandhu, Formal Model
and Policy Specification of Usage Control, ACM
Transactions on Information and System Security
(TISSEC), to appear. - Xinwen Zhang, Ravi Sandhu, and Francesco
Parisi-Presicce, Safety Analysis of Usage Control
Authorization Model, to appear in ACM Symposium
on Information, Computer, and Communication
Security, 2006. - Xinwen Zhang, Masayuki Nakae, Ravi Sandhu,
Michael J. Covington, A Usage-based
Authorization Framework for Collaborative
Computing Systems, in submission.
26 27 28OM-AM Framework (Sandhu 2000)
29Specifying Core Models
- An example Dynamic Separation of Duty (DSOD)
- A subject who prepares a check cannot issue it
30Expressive Power of preA
- A model for iTunes-like systems
- A UCON preA sheme (ATT, R, P, C), where
- Rregister, order, authorize, deauthorize, play
- ATT a set of attribute names
31Relative Expressive Power ofpreA preB
- A preB system can be simulated with a preA
system
32Relative Expressive Power ofpreA preB
- A preA system can be simulated with a preB
system