7 CONCLUSIONS AND FUTURE
WORK
XACML has appeared to cover the need of the cur-
rent authorization systems to represent in a standard
language the access control policies used to control
critical resources. Most of those current systems are
migrating their specific policies to XACML in order
to offer a more scalable and extensible solution.
The fact that XACML is a very helpful tool for se-
cure domain administrator does not imply that it is
easy to use. In a typical access control scenario, dur-
ing a routine policy creation or update, the domain ad-
ministrator does not have to deal with complex XML
schemes and documents but only with the fulfillment
of the set of permissions assigned to users under spe-
cific circumstances. In fact, the domain administrator
could not even understand the XACML language.
It shows the need of tools able to help domain ad-
ministrators to deal with complex XML documents in
a natural language. Moreover, this paper shows that
current generic XML or specific XACML editors do
not fulfill these requirements.
We have defined a way to manage those XML doc-
uments in a transparent way for the domain adminis-
trator, making use of a word-processing style editor
such as Microsoft InfoPath. In this way, once the nec-
essary XML templates and transformations are cre-
ated by a XACML expert, the domain administrator
can define low level XACML policies using human
readable forms.
The sample scenario we have used to test the pro-
posed solution is the NAS-SAML infrastructure. This
paper shows how the Target Access Policy template
and its associated XSL transformation can be gener-
ated by a security expert to make easy the adminis-
tration tasks to the network administrator. The rest
of policies used in this scenario can be defined in a
similar way.
Finally, the solution proposed in this work can be
also used to define other kind of documents based on
other XML specification, such as (Thompson et al.,
2003; Chadwick et al., 2003).
REFERENCES
Altova (2006). XMLSpy
R
. http://www.altova.
com/xmlspy.
Anderson, A., Parducci, B., Adams, C., Flinn, D., Brose,
G., Lockhart, H., Beznosov, K., Kudo, M., Humenn,
P., Godik, S., Andersen, S., Crocker, S., and Moses, T.
(2003). EXtensible Access Control Markup Language
(XACML) Version 1.0. OASIS Standard.
Apache Software Foundation (2006). The apache xalan
project. http://xalan.apache.org.
Chadwick, D., Otenko, O., and Ball, E. (2003). Implement-
ing role based access controls using x.509 attribute
certificates. IEEE Internet Computing, pages 62 – 69.
Clark, J. (1999). XSL Transformation (XSLT). W3C Rec-
ommendation.
Cánovas, O., Lopez, G., and Gómez-Skarmeta, A. (2004).
A credential conversion service for saml-based sce-
narios. In Proceedings First European PKI Workshop,
volume 3093 of Lecture Notes in Computer Science,
pages 297–305. Springer.
Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., and Yegin,
A. (2005). Protocol for Carrying Authentication for
Network Access (PANA). Internet Draft.
Hoffman, M. (2003). Architecture of Microsoft Office In-
foPath 2003. Microsoft Technical Report.
IEEE Computer Society (2001). P802.1x/d11: Standard for
port based network access control. IEEE Draft.
Lorch, M., Proctor, S., Lepro, R., Kafura, D., and Shah, S.
(2002). First Experiences Using XACML for Access
Control in Distributed Systems. ACM Workshop on
XML Security.
López, G., Cánovas, O., and Gómez, A. F. (2005). Use of
xacml policies for a network access control service. In
Proceedings 4th International Workshop for Applied
PKI, IWAP 05, pages 111–122. IOS Press.
López, G., Cánovas, O., Gómez, A. F., Jimenez, J. D.,
and Marín, R. (2006). A network access control ap-
proach based on the aaa architecture and authorzation
attributes. Journal of Network and Computer Appli-
cations JNCA. To be published.
OASIS (2006). OASIS eXtensible Access Control
Markup Language (XACML) TC. http:
//www.oasis-open.org/committees/
tc_home.php?wg_abbrev=xacml.
Thompson, M., Essiari, A., and Mudumbai, S. (2003).
Certificate-based authorization policy in a PKI envi-
ronment. ACM Transactions on Information and Sys-
tem Security (TISSEC), 6:566 – 588.
University of Murcia (2006). UMU XACML editor. http:
//xacml.dif.um.es.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
386