authorized for which purposes. This module is ad-
ministrated by the trusted entity that has the au-
thority to align a particular user or a group of user
to the particular purposes.
Figure 6: UCON enforcement meta model with purpose ex-
tension.
6.2 Enforcement Meta Model
In this section, we present the usage control enforce-
ment meta-model for UCON enforcement, as pre-
sented in Figure 4, which is able to configure the
enforcement engine with rules needed for each state
in usage sessions. It is important to note that, this
meta-model is the extension of the model proposed
by Basel et al (Katt, B. et al., 2008). We extend the
existing model by introducing a PDF Rules into the
existing model making it to be suitable for express-
ing policy that involves ongoing-check purpose ex-
pression. As illustrated in Figure 6, the core elements
of the meta-model are the ADF Rules, ODF Rules,
and PDF Rules.
• ADF Rules are the rules representing ADF func-
tion of the enforcement model (e.g., the authoriza-
tion and condition predicates of a UCON policy).
• The ODF Rules are obligation rules representing
ODF functions of the decision point.
• PDF Rules are the purpose rules representing
PDF function of the decision point.
In addition to the three rules component above,
there are other rules component that are applied
for different states in processing user’s request such
as RequestCheckRules, OngoingCheckRules, De-
niedRules, RevokedRules, and EndRules.
“RequestCheckRules” is applied at the Re-
questCheck state when subject requests to access
the object. “OngoingCheckRules” is applied at the
OngoingCheck state during the usage session, “De-
niedRules” is applied at Denied state when the re-
questCheckRules is fail. “RevokedRules” is applied
at revoked state, revoked state happens during the us-
age session when the usage rights no longer valid
(e.g., the obligation is not fulfilled or purpose of usage
is invalid) “EndRules” is applied at End state.
7 CONCLUSIONS AND FUTURE
WORK
In this paper, first, we modeled the purpose for dis-
tributed healthcare and then we extended UCON
ABC
to support “purposes” expression by introducing pur-
pose as one of its core components. Second, a
UCON
ABC
-based solution usage control enforcement
model is introduced. This model is designed to
enforce the purpose-based usage policy in the dis-
tributed healthcare environment. Following this work
is the implementation of the proposed model by
developing a prototype applied particularly to dis-
tributed healthcare. We prototype our usage enforce-
ment engine in Java programming language with the
support of Drools Expert as the policy evaluation en-
gine. It is worth noting that Open Digital Right Lan-
guage (with XML encoded) is used as the policy ex-
pression language in our experimentation.
REFERENCES
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R. (2001). Proposed NIST Standard
for Role-Based Access Control. In ACM Transactions
on Information and System Security, pages 4(3):222–
274.
Ji-Won, B., Elisa, B., and Ninghui, L. (2005). Purpose
based access control of complex data for privacy pro-
tection. In Proceedings of the tenth ACM symposium
on Access control models and technologies, SACMAT
’05, pages 102–110, New York, NY, USA. ACM.
Katt, B., Zhang, X., Breu, R., Hafner, M., and Seifert, J.-
P. (2008). A general obligation model and continu-
ity: enhanced policy enforcement engine for usage
control. In Proceedings of the 13th ACM symposium
on Access control models and technologies, SACMAT
’08, pages 123–132, New York, NY, USA. ACM.
Li, W. and Hoang, D. (2009). A new security scheme for
e-health system. In Proceedings of the 2009 Inter-
national Symposium on Collaborative Technologies
and Systems, pages 361–366, Washington, DC, USA.
IEEE Computer Society.
Mohammad, J., Philip, F., Reihaneh, S.-N., Ken, B., and
Paul, S. N. (2011). Towards defining semantic foun-
dations for purpose-based privacy policies. In Pro-
APurposeModelandPolicyEnforcementEngineforUsageControlinDistributedHealthcareInformationSystem
179