cutable (1.) drCox as assigner must be either physician
or manager – this is true; (2.) drCox as assigner and
physician must be attributed with this case; (3.) nurse-
Carla must be a nurse – this is also true.
Both, the second pre-clauses of assignCase and
third pre-clauses of readEHR, become satisfiable by
the delegation of case 42 to drCox by drKelso via
delegateCase: (1.) drKelso as delegator and drCox as
delegate are both physicians; (2.) drKelso is assigned
to this case. have se Consequently, a potential privi-
lege escalation is possible on a ward-by-ward base, i. e.
if at least one member (any one) of ward
x
is capable
of accessing cases originally treated in ward
y
, this
also holds for any other member of
x
. If, then again,
a different member of
x
is capable of accessing cases
from ward z, this may spread transitively.
Consequences.
The model originally formalizes a
policy which is based on the organizational structure
of a hospital. Now, the analysis results produced a
more substantial understanding of possible privilege
escalation vulnerabilities that are anchored in this de-
sign. To address these design flaws, a reiteration step
in the model engineering phase of MSPE is necessary
to improve the model design.
One possible approach to fix the above-discussed
privilege escalation phenomenon is summarized in
Tab. 3. In order to cover the semantics of ward-
crossing treatment workflows, the attribute team, the
user-team-attribution
att
UT
, and the indirect team-case-
attribution
att
TI
are introduced. A team consists of
users, possibly from different wards, such that any
team could commonly treat cases independent from
their “original” wards.
5 CONCLUSIONS
This paper presents DABAC, a modeling scheme for
ABAC policies that enables automaton-based analysis
and specification of ABAC policies. By classifying
formal abstractions in the semantical levels of primi-
tive model components, model dynamics, and safety
properties, we support a mix-and-match approach that
streamlines the integration of DABAC models in the
MSPE workflow. Based on a common ABAC use-
case, we have highlighted how this approach could
pave the way to a more standardized, tool-supported
engineering of ABAC systems.
This is also reflected in our ongoing work: sup-
porting DABAC-based MSPE by tools in two areas
of application. These are (1.) semi-automated model
implementation, based on our previous work on model
specification languages (Amthor and Schlegel, 2020);
(2.) real-time monitoring of model invariants which
cannot be proven during model analysis, such as is
the case with a heuristically analyzed but formally
undecidable safety definition. For a real-world appli-
cation integration, our future work aims at leveraging
DABAC to implement correct and reliable risk-based
ABAC policies based on real-time threat information
from external sources.
REFERENCES
Ahmed, T. and Sandhu, R. (2017). Safety of ABAC
α
Is
Decidable. In NSS ’17, pages 257–272.
Amthor, P. (2017). Efficient Heuristic Safety Analysis of
Core-based Security Policies. In SECRYPT ’17, pages
384–392.
Amthor, P. (2019). Aspect-oriented Security Engineering.
ISBN 978-3-7369-9980-0.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2013). Heuris-
tic Safety Analysis of Access Control Models. In SAC-
MAT ’13, pages 137–148.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2014).
WorSE: A Workbench for Model-based Security Engi-
neering. Comp. & Secur., 42(0):40–55.
Amthor, P. and Schlegel, M. (2020). Towards Language
Support for Model-based Security Policy Engineering.
In SECRYPT ’20, pages 513–521.
Barker, S. (2009). The Next 700 Access Control Models
or a Unifying Meta-Model? In SACMAT ’09, pages
187–196.
Basin, D., Clavel, M., and Egea, M. (2011). A Decade of
Model-Driven Security. In SACMAT ’11, pages 1–10.
Bertolissi, C., Fern
´
andez, M., and Thuraisingham, B. (2020).
Admin-CBAC: An Administration Model for Category-
Based Access Control. In CODASPY ’20, pages 73–84.
Bhatt, S. and Sandhu, R. (2020). ABAC-CC: Attribute-
Based Access Control and Communication Control for
Internet of Things. In SACMAT ’20, pages 203–212.
Biswas, P., Sandhu, R., and Krishnan, R. (2016). Label-
Based Access Control: An ABAC Model with Enu-
merated Authorization Policy. In ABAC ’16, pages
1–12.
Fern
´
andez, M., Mackie, I., and Thuraisingham, B. (2019).
Specification and Analysis of ABAC Policies via the
Category-Based Metamodel. In CODASPY ’19, pages
173–184.
Ferraiolo, D., Chandramouli, R., Kuhn, R., and Hu, V.
(2016). Extensible Access Control Markup Lan-
guage (XACML) and Next Generation Access Control
(NGAC). In ABAC ’16, pages 13–24.
Gupta, M., M. Awaysheh, F., Benson, J., Alazab, M., Patwa,
F., and Sandhu, R. (2020). An Attribute-Based Access
Control for Cloud-Enabled Industrial Smart Vehicles.
TII, 17(6):4288–4297.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. Comm. of the ACM,
19(8):461–471.
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis
245