12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ights and external identities, and Onion PolicyAdministration Model (OPA) [5], a new modelfor super-distribution which provides acompl<strong>et</strong>e traceability of the contentdistribution. The Applicability of the (E)DRMmodels to Governmental Organizations willalso be a direction of future work.References[1] P. Bieber <strong>et</strong> F. Cuppens. A Logical View ofSecure Dependencies. Journal of ComputerSecurity, 1(1), IOS press, 1992.[2] P. Bieber <strong>et</strong> F. Cuppens. SecureDependencies with Dynamic LevelAssignements. 5 th IEEE Computer SecurityFoundations Workshop, Franconia, 1992.[3] A. Sabelfeld and D. Sands. Dimensions andPrinciples of Declassification. In 18 th IEEEWorkshop on Computer Security Foundations,June 20 - 22, 2005.[4] T. Sans, F. Cuppens and N. Cuppens-Boulahia. FORM: A Federated RightsExpression Model for Open DRM Frameworks.ASIAN'06. Tokyo, Japan. December 2006.[5] T. Sans, F. Cuppens and N. Cuppens-Boulahia. OPA: Onion Policy AdministrationModel - Another approach to manage rights inDRM. IFIP/SEC. May 2007.Dynamic access and usage control in pervasive environmentsResearch Staff : Frédéric Cuppens, Nora Cuppens-Boulahia – Ph.D. Student: Yehia El RakaibyKeywords : Usage Control, Dynamic Access ControlApplications : Security of ubiquitous computing and pervasive environmentPartners & Funding : partially funded Conseil Régional de Br<strong>et</strong>agneIntroductionOver the previous several years, the world haswitnessed an important evolution in theexchange of digital information due toadvances in n<strong>et</strong>works and communication.N<strong>et</strong>works localization and presence servicesand the increase in the computing capabilitiesof the different electronic devices made way tohighly intelligent context-aware applications.Capturing security requirements of suchapplications in a policy-based securityframework represent an interesting challenge.One of those new security requirements isusage control. Usage control refers to thecontrols over data after it is released to som<strong>et</strong>hird party. It is undeniable that usage controlin today's digital environment is of utmostimportance and is needed in many applicationssuch as: DRM applications, P2P, availabilityrequirements, <strong>et</strong>c. Essentially, usage controldefine requirements that must be m<strong>et</strong> before,while or after the use of some resource.Examples of possible usage controls are "theuser must keep watching an advertisementwindow while watching the video" or "Withinthirty days after the use of the resource, theuser must pay for the use of the service".Among previous works on usage control are[1, 2].Salient features of future applications are mostlikely to include context-awareness andinteractivity b<strong>et</strong>ween the different serviceactors. Therefore it seems reasonable toassume that for a policy-based system toadequately me<strong>et</strong> those requirements, it mustenable the expression of some sort of dynamiccontextual security rules such as “from 9AM to18PM, if any of my family members requestsaccess to my files, I would like to be contactedto authorize the access”. One may justly saythat traditional access control systems relyingon MAC, DAC or RBAC policies are too rigid forthe expression of such security policies. Othermore recent policy-based systems whoseexpressivity is arguably b<strong>et</strong>ter suited for theexpression of such policies are [3, 4, 5].In this thesis, we have focused our attentionon the study of the different security56 Pracom’s Annual Report <strong>2008</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!