processing, the rule engine produces the policy deci-
sion reached which is then enforced by the appropri-
ate mechanisms.
9 CONCLUSIONS AND FUTURE
WORK
In this article, we have introduced an access control
model capable of supporting interactivity with users
to enable them to specify aspects of the access con-
trol policy at the time of the access request. We have
shown how it is possible to express clearly access re-
quirements difficult or impossible to express in tradi-
tional models and how different contextual conditions
fit into the model.
We are currently working to add support of ongo-
ing controls to the model (Park and Sandhu, 2004).
An important security requirement that we are also
looking into is to enable the user to add static rules
to the access control system e.g. to deny for always
or for a certain period of time requests from a par-
ticular subject as we recognize that the model is vul-
nerable to some social engineering attacks. We are
also considering integrating delegation with interac-
tivity to allow the users to delegate their capabilities
to others in a just-in-time manner (Ben Ghorbel-Talbi
et al., 2007). The ability to contact several contacts by
having more than one resource manager and handling
several user-responses for the same access request is
also studied.
Finally, we believe the model will prove to be an
interesting model for access control in pervasive and
collaborative environments and that it lays the foun-
dation to a new generation of access control systems
that integrate interactivity with users to add flexibility
to traditional access control systems.
ACKNOWLEDGEMENTS
This research is partially sponsored by the Polux
project funded by the French “Agence Nationale de la
Recherche”. Yehia El Rakaiby’s PhD thesis is funded
by a grant from the Britany region.
REFERENCES
Abou El Kalam, A., Baida, R. E., Balbiani, P., Benferhat,
S., Cuppens, F., Deswarte, Y., Mi
`
ege, A., Saurel, C.,
and Trouessin, G. (2003). Organization Based Access
Control. In Policy’03.
Adaikkalavan, R. and Chakravarthy, S. (2005). Active au-
thorization rules for enforcing role-based access con-
trol and its extensions. In Proc. of The 21st IEEE In-
ternational Conference on Data Engineering (ICDE).
Becker, M. and Sewell, P. (2004). Cassandra: distributed
access control policies with tunable expressiveness. In
POLICY 2004, pages 159–168.
Ben Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia,
N., and Bouhoula, A. (2007). Managing delegation
in access control models. ADCOM 2007, pages 744–
751.
Cuppens, F., Cuppens-Boulahia, N., and Ghorbel, M. B.
(2007). High level conflict management strategies
in advanced access control models. Electron. Notes
Theor. Comput. Sci., 186:3–26.
Cuppens, F. and Mi
`
ege, A. (2003). Modelling contexts in
the or-bac model. In 19th Annual Computer Security
Applications Conference (ACSAC ’03).
Cuppens, F. and Mi
`
ege, A. (2004). Administration Model
for Or-BAC. In Computer Systems Science and Engi-
neering (CSSE’04).
Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2001).
The ponder policy specification language. In POLICY
’01, pages 18–38, London, UK. Springer-Verlag.
Goffee, N., Kim, S., Smith, S., Taylor, P., Zhao, M., and
Marchesini, J. (2004). Greenpass: Decentralized, pki-
based authorization for wireless lans. 3rd Annual PKI
Research and Development Workshop Proceedings.
Haidar, D. A., Cuppens-Boulahia, N., Cuppens, F., and De-
bar, H. (2007). Access negotiation within xacml ar-
chitecture. SARSSI. Annecy, France.
Lobo, J., Bhatia, R., and Naqvi, S. (1999). A policy descrip-
tion language. In Sixteenth national conference on Ar-
tificial intelligence, pages 291–298, Orlando, Florida,
United States.
Moyer, M. J. (2001). Generalized role-based access con-
trol. In 21st International Conference on Distributed
Computing Systems.
Park, J. and Sandhu, R. (2004). The uconabc usage control
model. ACM Trans. Inf. Syst. Secur, pages 128–174.
R.S., S., Coyne E.J., F. H., and C.E., Y. (1996). Role-based
access control models. IEEE Computer.
Sloman, M. and Twidle, K. (1994). Domains: a framework
for structuring management policy. pages 433–453.
Stiemerling, O. and Wulf, V. (2004). Beyond ”yes or no”
- extending access control in groupware with aware-
ness and negotiation. Group Decision and Negotia-
tion, pages 221–235.
Zhang, G. and Parashar, M. (2004). Context-aware dynamic
access control for pervasive computing. In Commu-
nication Networks and Distributed Systems Modeling
and Simulation Conference.
SECRYPT 2008 - International Conference on Security and Cryptography
64