skip to main content
10.1145/1377836.1377849acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

ROWLBAC: representing role based access control in OWL

Published:11 June 2008Publication History

ABSTRACT

There have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In parallel, and almost separately, researchers have developed policy languages for access control. This paper is motivated by the consideration that these two parallel efforts need to develop synergy. A policy language in the abstract without ties to a model gives the designer little guidance. Conversely a model may not have the machinery to express all the policy details of a given system or may deliberately leave important aspects unspecified. Our vision for the future is a world where advanced access control concepts are embodied in models that are supported by policy languages in a natural intuitive manner, while allowing for details beyond the models to be further specified in the policy language.

This paper studies the relationship between the Web Ontology Language (OWL) and the Role Based Access Control (RBAC) model. Although OWL is a web ontology language and not specifically designed for expressing authorization policies, it has been used successfully for this purpose in previous work. OWL is a leading specification language for the Semantic Web, making it a natural vehicle for providing access control in that context. In this paper we show two different ways to support the NIST Standard RBAC model in OWL and then discuss how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute-based access control. We further examine and assess OWL's suitability for two other access control problems: supporting attribute based access control and performing security analysis in a trust-management framework.

References

  1. M. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. Computer Security Applications Conference, 2002. Proceedings. 18th Annual, pages 353--362, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Baader. Restricted role-value-maps in a description logic with existential restrictions and terminological cycles. Proc. DL 2003.Google ScholarGoogle Scholar
  3. F. Baader. The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Barka and R. Sandhu. Framework for role-based delegation models. In Annual Computer Security Applications Conference, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Bechhofer, F. van Harmelen Jim Hendler, I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. Owl web ontology language reference, February 2004. http://www.w3.org/TR/owl-ref.Google ScholarGoogle Scholar
  6. T. Berners-Lee, D. Connolly, L. Kagal, J. Hendler, and Y. Schraf. N3Logic: A Logical Framework for the World Wide Web. Journal of Theory and Practice of Logic Programming (TPLP), Special Issue on Logic Programming and the Web, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. Lecture Notes in Computer Science, 1995, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Di, L. Jian, D. Yabo, and Z. Miaoliang. Using semantic web technologies to specify constraints of rbac. Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on, pages 543--545, 05-08 Dec. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3):224--274, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224--274, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002.Google ScholarGoogle Scholar
  12. P. Hayes and B. McBride. RDF Semantics. http://www.w3.org/TR/rdf-mt/, 2004.Google ScholarGoogle Scholar
  13. N. Heilili, Y. Chen, C. Zhao, Z. Luo, and Z. Lin. An owl based approach for rbac with negative authorization. Lecture Notes in Computer Science, 4092:164, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. I. Horrocks, P. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission, 21, 2004.Google ScholarGoogle Scholar
  15. S. Jajodia, P. Samarati, and V. Subrahmanian. A Logical Language for Expressing Authorizations. Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 31, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Kagal, T. Finin, and A. Joshi. A policy language for pervasive systems. In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. O. Lassila, R. Swick, et al. Resource Description Framework (RDF) Model and Syntax Specification. 1999.Google ScholarGoogle Scholar
  18. N. Li, B. N. Grosof, and J. Feigenbaum. A practically implementable and tractable delegation logic. In Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2000, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. DARPA Information Survivability Conference and Exposition (DISCEX), pages 123--139.Google ScholarGoogle Scholar
  20. N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 114--130, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N. Li, J. Mitchell, and W. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM (JACM), 52(3):474--514, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. L. McGuinness and F. van Harmelen. Owl web ontology language overview, February 2004. http://www.w3.org/TR/owl-features/.Google ScholarGoogle Scholar
  23. T. Moses et al. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005.Google ScholarGoogle Scholar
  24. J. Park and R. Sandhu. The UCONABC usage control model. ACM Transactions on Information and System Security, 5(6), 2007.Google ScholarGoogle Scholar
  25. A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Communications of the ACM, 49(9):39--44, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Reith, J. Niu, and W. Winsborough. Model checking to security analysis in trust management. In ICDE Workshop on Security Technologies for Next Generation Collaborative Business Applications, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. N. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. SPL: An access control language for security policies with complex constraints. In Network and Distributed System Security Symposium (NDSS'01), 2001.Google ScholarGoogle Scholar
  28. R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998.Google ScholarGoogle Scholar
  30. M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988.Google ScholarGoogle Scholar
  31. A. P. Sistla and M. Zhou. Analysis of dynamic policies. Inf. Comput., 206(2-4):185--212, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable Sec. Comput., 3(1):13--30, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. B. Thuraisingham. Assured information sharing. Technical Report UTDCS-43-06, Computer Science Department, University of Texas Dallas, 2006. to appear as Book Chapter in Security Informatics by Springer, editor: H. Chen.Google ScholarGoogle Scholar
  34. G. Tonti, J. M. Bradshaw, R. Jeffers, R. Montanar, N. Suri1, and A. Uszok1. Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder. In Proceedings of the 2nd International Semantic Web Conference (ISWC2003). Springer-Verlag, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 45--55, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ROWLBAC: representing role based access control in OWL

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
          June 2008
          214 pages
          ISBN:9781605581293
          DOI:10.1145/1377836

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 June 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader