skip to main content
research-article

XACML Policy Integration Algorithms

Published:05 February 2008Publication History
Skip Abstract Section

Abstract

XACML is the OASIS standard language specifically aimed at the specification of authorization policies. While XACML fits well with the security requirements of a single enterprise (even if large and composed by multiple departments), it does not address the requirements of virtual enterprises in which several autonomous subjects collaborate by sharing their resources to provide better services to customers. In this article we highlight such limitation, and we propose an XACML extension, the policy integration algorithms, to address them. In the article we also present the implementation of a system that makes use of the policy integration algorithms to securely replicate information in a P2P-like environment. In our solution, the data replication process considers the policies specified by both the owners of the data shared and the peers sharing data storage.

References

  1. Anderson, A. 2004. An introduction to the Web services policy language. IEEE Policy 2004 Workshop. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, A. 2005a. A Comparison of Two Privacy Policy Languages: EPAL and XACML. Sun Microsystems, Inc.Google ScholarGoogle Scholar
  3. Anderson, A. 2005b. Ws-policyconstraints: A domain-independent Web services policy assertion language. Sun Microsystems, Inc.Google ScholarGoogle Scholar
  4. Backes, M., Bagga, W., Karjoth, G., and Schunter, M. 2004. Efficient comparison of enterprise privacy policies. In Proceedings of the ACM Symposium on Applied Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Baker, M., Kimberly, K., and Sean, M. 2005. Why traditional storage systems do not help us save stuff forever. Tech. rep. HPL-2005-120. HP Labs.Google ScholarGoogle Scholar
  6. Barth, A., Mitchell, J. C., and Rosenstein, J. 2004. Conflict and combination in privacy policy languages. In Workshop on Privacy in the Electronic Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. EU. 1995. Eu directive on data privacy 95/46/ec.Google ScholarGoogle Scholar
  8. Fisler, K., Krishnamurthi, S., Meyerovich, L., and Tschantz, M. 2005. Verification and change impact analysis of access-control policies. In International Conference on Software Engineering (ICSE). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. HIPAA. 1996. U.S. government department of health and human services health. Insurance Portability and Accountability Act.Google ScholarGoogle Scholar
  10. HP. 2005. Virtualized infrastructure solutions for mysap business suite. http://h71028.www.hp.com/enterprise/downloads/HP-virtualSAP_Solution-Brief.pdf.Google ScholarGoogle Scholar
  11. Huang, D. 2005. Semantic policy-based security framework for business processes. 4th Semantic Web and Policy Workshop.Google ScholarGoogle Scholar
  12. IBM. 2004. Automate and integrate within and across it processes to support the continually changing needs of business processes. IBM White paper.Google ScholarGoogle Scholar
  13. Kusnetzky, D. and Olofson, C. W. 2004. Oracle 10g: Putting grids to work. http://www.oracle.com/technology/tech/grid/collateral/idc_oracle10g.pdf.Google ScholarGoogle Scholar
  14. Lionshare, Project. http://lionshare.its.psu.edu/main/.Google ScholarGoogle Scholar
  15. Lockss, Project. http://lockss.stanford.edu/.Google ScholarGoogle Scholar
  16. Lorch, M., Proctor, S., Lepro, R., Kafura, D., and Shah, S. 2003. First experiences using xacml for access control in distributed systems. Proceedings of the ACM Workshop on XML Security (XMLSEC'03). ACM, New York, NY, 25--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mazzoleni, P., Crispo, B., Sivasubramanian, S., and Bertino, E. 2005. Efficient integration of fine-grained access control in large-scale grid services. In IEEE International Conference on Service Computing (SCC'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Morr, D. 2004a. Lionshare: A federated p2p app. In Internet2 Members Meeting.Google ScholarGoogle Scholar
  19. Morr, D. 2004b. Wspl: an xacml-based Web services policy language. In Internet2 Members Meeting.Google ScholarGoogle Scholar
  20. OASIS. 2002. ebxml collaboration protocol profile and agreement technical committee. Collaboration-Protocol Profile and Agreement Specification Version 2.0.Google ScholarGoogle Scholar
  21. OASIS. 2005. Security services technical committee. e{X}tendible {A}ccess {C}ontrol {M}arkup {L}anguage Committee Specification 2.0.Google ScholarGoogle Scholar
  22. OASIS. 2006. http://docs.oasis-open.org/xacml/xacmlrefs.html.Google ScholarGoogle Scholar
  23. OMG, O. M. G. 2003. Response to the uml 2.0 ocl rfp (ad/2000-09-03), revised submission, version 1.6, 6 January 2003. OMG Document ad/2003-01-07.Google ScholarGoogle Scholar
  24. Sun. Xacml implementation. http://sunxacml.sourceforge.net/.Google ScholarGoogle Scholar
  25. W3C. 2003. Enterprise privacy authorization language (epal).Google ScholarGoogle Scholar
  26. W3C. 2004a. Owl Web ontology language.Google ScholarGoogle Scholar
  27. W3C. 2004b. W3C Workshop on Constraints and Capabilities for Web Services.Google ScholarGoogle Scholar
  28. Zhang, N., Ryan, M., and Guelev, D. P. 2004. Synthesising verified access control systems in xacml. In 2nd ACM Workshop on Formal Methods in Security Engineering. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. XACML Policy Integration Algorithms

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 11, Issue 1
      February 2008
      99 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/1330295
      Issue’s Table of Contents

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 February 2008
      • Accepted: 1 June 2007
      • Revised: 1 April 2007
      • Received: 1 November 2006
      Published in tissec Volume 11, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader