In (Nejdl et al., 2005) the authors propose POLI-
CYTAB for facilitating trust negotiation in Semantic
Web environments. POLICYTAB adopts ontologies
for the representation of policies that guide a trust
negotiation process ultimately aiming at granting, or
denying, access to sensitive Web resources. These
policies essentially specify the credentials that an en-
tity must possess in order to carry out an action on a
sensitive resource that is under the ownership of an-
other entity. Nevertheless, no attempt is made to se-
mantically model the context associated with access
requests, rendering POLICYTAB inadequate for the
dynamic nature of cloud environments.
6 CONCLUSIONS
We have presented an approach to reasoning about
subsumption between access control policies in dy-
namic cloud environments. The reasoning is based
on a semantic characterisation of all those access re-
quests to which the policies respond in an identical
manner, whilst it is performed automatically through
semantic inferencing that is carried out by off-the-
shelf reasoners. As part of future work we intend to
perform further performance tests in order to more ac-
curately determine the scalability of our approach to
larger underlying CMs. In addition, we intend to in-
corporate our approach in an editor that we are cur-
rently developing for facilitating the construction of
ABAC rules, policies and policy sets. This way, each
time a new rule, policy or policy set is created, the
editor will determine whether it is subsumed by an
existing rule, policy or policy set and thus assist de-
velopers in devising effective access control policies
and policy sets.
REFERENCES
(2004). W3C Recommendation. 2004. OWL Web Ontology
Language Reference. W3C. https://www.w3.org/TR/
owl-ref.
(2013). eXtensible Access Control Markup Language
(XACML) Version 3.0. OASIS. http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
(2015). Paasword - a holistic data privacy and security by
design platform-as-a service framework. https://www.
paasword.eu.
(2015). What’s Hindering the Adoption of Cloud Com-
puting in Europe? Cloud Security Alliance.
https://blog.cloudsecurityalliance.org/2015/09/15/
whats-hindering-the-adoption-of-cloud-computing-
in-europe/.
Horrocks, I., Kutz, O., and Sattler, U. (2006). The even
more irresistible sroiq. In Doherty, P., Mylopoulos, J.,
and Welty, C. A., editors, Proc. of the 10th Int. Conf.
on Principles of Knowledge Representation and Rea-
soning, pages 57–67. AAAI Press.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., San-
dlin, K., Miller, R., and Scarfone, K. (2014). Guide
to Attribute Based Access Control (ABAC) Definition
and Considerations. NIST. http://nvlpubs.nist.gov/
nistpubs/specialpublications/NIST.SP.800-162.pdf.
Kagal, L., Finin, T., and Joshi, A. (2003). A policy language
for a pervasive computing environment. In Proceed-
ings POLICY 2003. IEEE 4th International Workshop
on Policies for Distributed Systems and Networks,
pages 63–74.
Kolovski, V., Hendler, J., and Parsia, B. (2007). Analyz-
ing web access control policies. In Proceedings of the
16th International Conference on World Wide Web,
WWW ’07, pages 677–686, New York, NY, USA.
ACM.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L.,
and Leaf, D. (2011). NIST Cloud Computing Refer-
ence Architecture.
Nejdl, W., Olmedilla, D., Winslett, M., and Zhang, C. C.
(2005). Ontology-based policy specification and
management. pages 290–302, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Sirin, E., Parsia, B., Grau, B. C., Kalyanpur, A., and Katz,
Y. (2007). Pellet: A practical owl-dl reasoner. Web
Semant., 5(2):51–53.
Uszok, A., Bradshaw, J., Jeffers, R., Johnson, M., Tate, A.,
Dalton, J., and Aitken, S. (2004). KAoS policy man-
agement for semantic web services. IEEE Intel. Sys.,
19(4):32–41.
Veloudis, S. and Paraskakis, I. (2015). Access Policies
Model. PaaSword Project Deliverable D2.2.
Veloudis, S. and Paraskakis, I. (2016). Defining an on-
tological framework for modelling policies in cloud
environments. In 8th IEEE International Conference
on Cloud Computing Technology and Science (Cloud-
Com’16).
Veloudis, S., Paraskakis, I., Petsos, C., Verginadis, Y., Pa-
tiniotakis, I., and Mentzas, G. (2017). An ontologi-
cal template for context expressions in attribute-based
access control policies. In Proceedings of the 7th In-
ternational Conference on Cloud Computing and Ser-
vices Science - Volume 1: CLOSER,, pages 151–162.
INSTICC, ScitePress.
Veloudis, S., Verginadis, Y., Paraskakis, I., Patiniotakis, I.,
and Mentzas, G. (2016). Context-aware security mod-
els for paas-enabled access control. In Proceedings of
the 6th International Conference on Cloud Comput-
ing and Services Science (CLOSER 2016) Vol. 1 and
2, pages 201–212. INSTICC, ScitePress.
Verginadis, Y., Patiniotakis, I., and Mentzas, G. (2015).
Context-aware Security Model, PaaSword Project
Deliverable D2.1. https://www.paasword.eu/wp-
content/uploads/2016/09/D2-1\ Context-
awareSecurityModel.pdf.
CLOSER 2019 - 9th International Conference on Cloud Computing and Services Science
362