6 RELATED WORK
First definition of the Usage Control model has been
proposed by Sandhu et al. in (Park and Sandhu,
2004), whilst a first application on collaborative com-
puting system is discussed in (Zhang et al., 2008).
A recent work on application of Usage Control for
handling ongoing access on data has been proposed
in (Lazouski et al., 2016). The proposed framework
has been designed and implemented for Android de-
vices, partially leveraging on native security mecha-
nisms and the presence of a TPM for integrity man-
agement. This work is based on standard Usage Con-
trol, i.e., does not leverage history-based policies, in
an environment such as smartphones where the higher
expressiveness of History-Based policies, could bring
a noticeable benefit.
In (Kelbert and Pretschner, 2014) Kelbert and
Pretschner present an application of Usage Control
to distributed and multi domain systems. In the pre-
sented work, the authors assume that data can travel
across different domains where the same policy has
to be enforced. Also this application can benefit from
the extension to Usage Control presented in the cur-
rent work, defining conditions where usage is granted
only if the specific data has been first opened and
then archived by a specific sequence of agents of the
distributed system. From the same authors, another
framework which is specific for data Usage Con-
trol is presented in (Kelbert and Pretschner, 2015).
This framework offers a decentralized and distributed
enforcement infrastructure, which however does not
consider and enforce history-based policies.
On the formal aspects, the ConSpec language,
presented in (Aktug and Naliuka, 2008) is another
language which can express history-based policies.
ConSpec can be expressed either as a labeled tran-
sition system or in a text form. However, the Con-
Spec language is not compliant with standards, shar-
ing thus the same strength and weaknesses shown in
the POLPA language.
The POLPA language has been previously
adopted in (Martinelli and Mori, 2007) for improv-
ing the Java native security support by enabling the
enforcement of history-based access control policies.
Instead, a proposal of history-based Usage Control
system entirely based on the POLPA language is pre-
sented (Martinelli and Mori, 2010). However, writing
policies in POLPA dealing also with Usage Control
features, is not straightforward.
The approach proposed in this paper, which pro-
poses to write the Usage Control policies in U-
XACML and exploits POLPA to combine them, eases
the work of policy makers.
7 CONCLUSION
In this paper we extended the formal approach pre-
sented in (Martinelli et al., 2016) which defines a His-
tory based U-XACML Usage Control policy language
by combining U-XACML policies through the oper-
ators of the POLPA language. The proposed exten-
sion to the language allows the enforcement of two
(or more) Usage Control policies in parallel, i.e., the
related operations can be executed in any order and an
operation can be started when the other(s) is (are) still
in execution. We also presented a motivating exam-
ple, where a company needs to regulate the usage of
a document shared among a set of employees, and we
show that the proposed language can be successfully
exploited to define the policy which encodes the set
of sharing requirements.
As ongoing work, we are implementing the pro-
posed framework to validate it and evaluate it in terms
of its performance.
ACKNOWLEDGEMENTS
This work was partially supported by the H2020 EU
funded project NeCS [GA #675320], by the H2020
EU funded project C3ISP [GA #700294], and by the
EIT Digital High Impact Initiative #14605 Trusted
Data Management with Service Ecosystem.
REFERENCES
Aktug, I. and Naliuka, K. (2008). ConSpec - A formal lan-
guage for policy specification. Science of Computer
Programming. Special Issue on Security and Trust,
74(1):2 – 12.
Baiardi, F., Martinelli, F., Mori, P., and Vaccarelli, A.
(2004). Improving grid services security with fine
grain policies. In On the Move to Meaningful Internet
Systems 2004: Confederated International Workshops
and Posters, GADA, JTRES, MIOS, WORM, WOSE,
PhDS, and INTEROP 2004, Agia Napa, Cyprus, Oc-
tober 25-29, 2004. Proceedings, pages 123–134.
Colombo, M., Lazouski, A., Martinelli, F., and Mori, P.
(2010). A proposal on enhancing xacml with continu-
ous usage control features. In Grids, P2P and Services
Computing, pages 133–146, Boston, MA. Springer
US.
Kelbert, F. and Pretschner, A. (2014). Decentralized dis-
tributed data usage control. In Cryptology and Net-
work Security: 13th International Conference, CANS
2014, Heraklion, Crete, Greece, October 22-24, 2014.
Proceedings, pages 353–369, Cham. Springer Interna-
tional Publishing.
AMARETTO 2017 - International Special Session on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn
664