12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

equirements in pervasive environments. Inparticular, we studied the best means for theexpression of usage control and dynamicaccess control within an integrated singlesecurity framework.RealizationWe have first analyzed the securityrequirements of future applications, namelyusage and dynamic access control, and studiedthe current policy-based security frameworks.We aim to develop an intuitive language withformal semantics for the representation ofdynamic security requirements and provideoperational formal interpr<strong>et</strong>ation of thedeveloped language. From our analysis of thenature of dynamic access control and usagecontrol, the notion of obligations appeared tobe fundamental (the same conclusion wasreached by previous works on usage control[1, 2]). Therefore, we have worked on thespecification of an obligation controller for theinterpr<strong>et</strong>ation of the dynamic part of ourpolicy. In order to give formal operationalsemantics to the controller, we have studiedthe well established ECA paradigm from activedatabases and identified how active rules canadequately provide the controller clear formaloperational semantics. Our final goal was tointegrate the obligation controller with acontext-aware access controller in a singlesecurity framework.Future workFuture work consists of the finalization of ourapproach in order to have a single policybasedsecurity framework which encompassestraditional access control, dynamic accesscontrol and usage control.References[1] J. Park and R. Sandhu. The UCON ABCusage control model. ACM Trans. InformationSystems Security, 2004.[2] M. Hilty, A. Pr<strong>et</strong>schner, D. Basin, C.Schaefer and T. Walter. A Policy Language forDistributed Usage Control. ESORICS, 2007.[3] A. Abou El Kalam, R. El Baida, P. Balbiani,S. Benferhat, F. Cuppens, Y. Deswarte, A.Miege, C. Saurel and G. Trouessin.Organization based access control. Policy,2003.[4] F. Cuppens, N. Cuppens-Boulahia and T.Sans. Nomad: A Security Model with NonAtomic Actions and Deadlines. 18th IEEECSFW, Aix-en-Provence, France, Juin 2005.[5] L. Kagal, T. Fini and A. Joshi. A policylanguage for a pervasive computingenvironment. Policy, 2003.Pracom’s Annual Report <strong>2008</strong> 57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!