UCON M ODEL Huỳnh Châu Duy
OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access control DRM CONCLUSION
UCON MODEL WHAT?WHEN? WHAT FOR? WHY?
TRADITIONAL ACCESS CONTROL Mandatory Access Control (MAC) Discretionary Access Control (DAC) Role Based Access Control (RBAC) Focus in a closed system environment Not adequate for today’s distributed, network- connected digital environment. Authorization only Decision is made before access No consumable rights Rights are pre-defined and granted to subjects
DIGITAL RIGHT MANAGEMENT(DRM) Controlling and tracking access to and use of digital information objects at client-side. Mainly focus on intellectual property rights protection. Lack of access control model.
PROBLEM
UCON MODEL WHAT?WHEN? WHAT FOR? WHY?
UCON ABC MODEL COMPONENTS
Subjects Attributes Consumer Subjects Provider Subjects Identifiee Subjects Objects Attributes Rights
WHAT IS UCON ABC MODEL? OBLIGATIONS AUTHORIZATIONS CONDITIONS
AUTHORIZATIONS Functional predicates that have to be evaluated for usage decision. Return whether the subject(requester) is allowed to perform the requested rights on the object. Authorizations can be either pre-authorizations (preA) or ongoing-authorizations (onA).
OBLIGATIONS Functional predicates that verify mandatory requirements a subject has to perform before or during a usage exercise. Obligations can be either pre-obligations (preB) or ongoing-obligations (onB)
CONDITIONS Environmental or system-oriented decision factors. Unlike authorizations or obligations, condition variables cannot be mutable. Evaluation of conditions cannot update any subject or object attributes.
OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access control DRM CONCLUSION
CORE MODEL The 16 basic UCON ABC models 0 immutable 1 pre_update 2 ongoing_update 3 post_update preAYYNY onAYYYY preBYYNY onBYYYY preCYNNN onCYNNN
CORE MODEL AUTHORIZATIONS preA onA
CORE MODEL preA preA0 preA1 preA3 Example : - Pay-per-view (preUpdate) - Metered payment (postUpdate)
CORE MODEL onA onA0 onA1 onA2 onA3 Example : Pay-per-Minutes
CORE MODEL OBLIGATIONS preB onB
CORE MODEL preB preB0 preB1 preB3 Example : Free Internet Service
CORE MODEL onB onB0 onB1 onB2 onB3
CORE MODEL CONDITIONS preC onC
CORE MODEL Example : Healthcare Education Long-distance phone Pre-paid phone card Click Ad within every 30 minutes Business Hour
OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access control DRM CONCLUSION
COMPARISON Traditional Access Control RBAC MAC DAC UCON MODEL Authorizations Obligations Conditions
COMPARISON DRM pay-per-use multiple credits UCON MODEL Authorizations Obligations Conditions
OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access control DRM CONCLUSION
CONSLUSION UCON ABC leaves open the architecture and mechanisms for providing trusted attributes.