|

|
|
OASIS eXtensible Access Control Markup Language TC |
Defining XACML, an XML specification for expressing policies for information access over the Internet |
|
|
Submissions and Position Papers
Slides
- F2F#4
- XML resource protection use case(pdf,word), by Michiharu Kudo
- F2F#3
- J2SE use case(.pdf), by Sekhar Vajjhala
- Boolean Policy Resolution(text),
by Ann Anderson
- Thoughts on Proposal 0.8 (.ppt),
by Hal Lockhart
- Triple-based policy schema proposal, by Simon Godik
- F2F#2
- What needs to be specified by the XACML model?(.pdf),
by Pierangela Samarati
- Use Case and Requirement(.ppt),(.pdf),
by Michiharu Kudo
- F2F#1
- Slides for F2F#1, Medical Use Case(.ppt),
by Fred Moses
- Slides for F2F#1, Overview of XACL(.zip),
by Michiharu Kudo
- Slides for F2F#1, Preliminary Proposal(.ppt),
by Tim Moses
Domain Model
- XACML Domain Model ver.3(.doc),
by Gilbert Pilz
Policy Model
- What needs to be specified by the XACML policy model?(.doc)(.htm),
by Ernesto Damiani and Pierangela Samarati
Language Proposal
- XACML Policy Proposal (.doc),
by Carlisle Adams
Use Cases
- OASIS ebXML Registry-Access Control Related Use Cases(.doc),
by Suresh Damodaran
- ebXML Registry Access Control Use Case: Issues(.doc),
by Suresh Damodaran
- Medical Use Cases(.doc),
by Meg Kistin Anzalone and Fred Moses
- Use Cases for Access control on XML Resources(.doc),
by Michiharu Kudo
- XACML DRM Use Case Proposal(.pdf),
by Thomas Hardjono
- Online Server Usecases(.doc),
by Hal Lockhart
- Financial Regulatory Usecases(.doc),
by Simon Blackwell
Others
- Requirements for a Rights Data Dictionary and Rights
Expression Language(.doc),
by David Parrott
- Report on Reuters Response to MPEG-21 CfR(.ppt),
by David Parrott
Powerpoint slides presented by Dr David
Parrott (Reuters) to the XACML Committee on 18 July 2001.
Patents
The following U.S. Patents
may be relevant to XACML work:
- 5,715,403 System for controlling the distribution and use of
digital works having attached usage rights where the usage rights
are defined by a usage rights grammar
- 5,629,980 System for controlling the distribution and use of
digital works
- 5, 638, 443 System for Controlling the Distribution and Use of
Composite Digital Works
Auxiliary Resources
The following works have substantial overlap with XACML:
The following external resources have been identified as useful
for the TC's work:
- RFC 3060: Policy Core Information Model, Internet Society,
Network Working Group
Brief summary by Bill
Parducci, RFC3060 presents the object-oriented information
model for representing policy information developed jointly in the
IETF Policy Framework WG and as extensions to the DMTF CIM. This
model defines two hierarchies of object classes: structural
classes representing policy information and control of policies,
and association classes that indicate how instances of the
structural classes are related to each other. Two fundamental
design parameters are: (1) the primary use of the declaritive (vs.
procedural) policy model; (2) self imposed limitations in richness
of expression for ease of implementation and use.
- RDF: A lightweight
ontology system to support knowledge exchange on the Web
- IRTF AAA
Architecture group RFCs:
- RFC
2903: Generic AAA Architecture
- RFC
2904: AAA Authorization Framework
- RFC
2905: AAA Authorization Application Examples
- RFC
2906: AAA Authorization Requirements
- A
grammar for Policies in a Generic AAA Environment
In
this document a formal model of a language to describe policies
is presented in the context of a generic AAA environment. The
document introduces the concept of a Driving Policy. A Driving
Policy specifies the behavior of an 'AAA' server (composed of a
Rule Based Engine, Policy Repository and Application Specific
Module). A key aspect of a Driving Policy is that it be dynamic
in nature, as even minor changes in the Policy Repository or
Application Specific Module may significantly affect the
behavior of the server. Identified but not resolved, are the
complexities that arise from external policies (e.g. being
pushed from the user in a request). Syntactical ambiguities
resulting from policy nesting are noted with possible solutions
said to be forthcoming.
- CORBA Security Specification
- MPEG4 & MPEG21 Requirements docs
- Access Control Models
Academic papers related to the TC's work:
- ``Securing
XML Documents,'': E. Damiani, S. De Capitani di Vimercati, S.
Paraboschi, P. Samarati, Proc. of the 2000 International
Conference on Extending Database Technology (EDBT2000), Konstanz,
Germany, March 27-31, 2000
- ``Design
and Implementation of an Access Control Processor for XML
Documents'': E. Damiani, S. De Capitani di Vimercati, S.
Paraboschi, P. Samarati, Computer Networks, vol. 33, no. 1-6,
2000, pp. 59-75; and Proc. of the Ninth International World Wide
Web Conference (WWW9), Amsterdam, May 15-19, 2000.
These are
the papers that present our fine-grained access control for XML
documents.
- ``Fine-Grained
Access Control for SOAP E-Services,'': E. Damiani, S. De
Capitani di Vimercati, S. Paraboschi, P. Samarati, Proc. of the
Tenth International World Wide Web Conference (WWW10) , Hong Kong,
May 1-5, 2001.
This paper presents an extension to our
access control system for regulating access to SOAP e-services.
The approach is based on intercepting and filtering requests.
- ``Flexible
Support for Multiple Access Control Policies,'': S. Jajodia,
P. Samarati, M.L. Sapino, and V.S. Subrahmanian, ACM Transactions
on Database Systems, to appear.
It presents a logic-based
language for expressing security policies.
- ``An
Algebra for Composing Access Control Policies,'': P. Bonatti,
S. De Capitani di Vimercati, and P. Samarati, ACM Transactions on
Information and System Security, to appear.
It presents an
algebra for expressing complex policies characterized by merging
different components that need to be maintained independently.
- ``Regulating
Service Access and Information Release on the Web,'': P.
Bonatti, P. Samarati, Proc. 7th ACM Conference on Computer and
Communications Security, Athens, Greece, November 1-4,
2000.
It presents a security model for regulating access in
an open distributed environments where clients may not been known
apriori to servers. It supports certificate-based authorizations.
It also addresses the problem of security policy communication
between server and client (as the server needs to tell the clients
which certificates may be necessary for an access).
- ``An
Access Control Model for Data Archives,'': P. Bonatti, E.
Damiani, S. De Capitani di Vimercati, P. Samarati, IFIP-TC11
International Conference on Information Security, Paris, France,
June 11-14, 2001.
It presents an access control for
regulating access to data archives. The goal there was to present
a solution that was expressive enough to cover the requirements
gathered by the partners but at the same time simple. Particular
attention was devoted to the language for specifying
authorizations. You can see this as an input for use cases (as the
solution was based on protection requirements collected from
users).
- ``Access
Control: Policies, Models, and Mechanisms,'': P. Samarati and
S. De Capitani di Vimercati, Foundations of Security Analysis and
Design, R. Focardi and R. Gorrieri (eds), LNCS 2172,
Springer-Verlag.
Survey chapter on security policies and
models.
- ``XML
Document Security Based on Provisional Authorization'': M.
Kudo and S. Hada, Proc. 7th ACM Conference on Computer and
Communications Security, Athens, Greece, November 1-4,
2000.
It presents overview of XACL language and a proposed
notion of provisional authorization.
- S. Jajodia, M. Kudo, and V. S. Subrahmanian, Provisional
Authorization, E-Commerce Security and Privacy, Anup Ghosh, ed.,
Kluwer Academic Publishers, Boston, 2001, pages 133--159.
It
presents a formal model for provisional authorization based on
logic-programming.
- Policies for
Network and Distributed Systems Management
- The
Policy Framework (brief intro; worth reading)
- Ponder
A Policy Language for Distributed Systems Management
- ``The
Ponder Specification Language'': N. Damianou, N. Dulay, E.
Lupu, M Sloman, Workshop on Policies for Distributed Systems and
Networks (Policy2001), HP Labs Bristol, 29-31 Jan
2001.
Ponder Summary Paper
- ``A
Policy Deployment Model for the Ponder Language,'': N. Dulay,
E. Lupu, M Sloman, N. Damianou, An extended version of paper in
Proc. IEEE/IFIP International Symposium on Integrated Network
Management (IM?2001), Seattle, May 2001, IEEE Press.
Ponder
Deployment Paper
- Ponder
Language Specification
- Ponder
SableCC grammar
- Ponder
Software Main Page
- Securing XML Documents with
Author-X: E. Bertino, S. Castano, E. Ferrari,IEEE Internet
Computing, Maggio/Giugno 2001.
- On specifying security policies
for web documents with an XML-based Language: E. Bertino, S.
Castano, E. Ferrari, Proc. of SACMAT'2001, ACM Symposium on Access
Control Models and Technologies, Fairfax, VA, May 2001.
- E. Bertino, S. Castano, E. Ferrari. Securing XML Documents:
the Author-X Project Demonstration, In Proc. of ACM SIGMOD 2001
Conference, Santa Barbara, CA, USA, Maggio 2001.
- E. Bertino, S. Castano, E. Ferrari, M.Mesiti, Specifying and
Enforcing Access Control Policies for XML Document Sources, World
Wide Web Journal, Baltzer Science Publishers, Vol.3, N.3, 2000.
- E. Bertino, S. Castano, E. Ferrari, M.Mesiti, Author-X: a
Java-Based System for XML Data Protection, in Proc. of the 14th
Annual IFIP WG. 11.3 Working Conference on Database Security,
Schoorl (near Amsterdam), The Netherlands, August 2000.
- E. Bertino, S. Castano, E. Ferrari, M. Mesiti, Controlled
Access and Dissemination of XML Documents, in Proc. of ACM CIKM'99
2nd Workshop on Web Information and Data Management (WIDM'99),
Kansas City, Missouri, USA, November 1999.
- A. Gabillon, E. Bruno, Regulating
Access to XML documents, Fifteenth Annual IFIP WG 11.3 Working
Conference on Database Security. Niagara on the Lake, Ontario,
Canada July 15-18, 2001.
Procedure
TC members should note the following procedure for publishing
documents to the repository:
-
If your submission is covered by the document guidelines,
try to ensure that it follows the
guidelines (especially regarding file format and
file name).
-
Send mail to the xacml-editors
list, attaching the submission and indicating the
list(s) to which the eventual URL(s) should be published.
-
If the submission needs further work with respect
to the guidelines, and the folks on the xacml-editors
list can't perform this work themselves, they'll
return it to you with their requests.
-
If the submission is (or can be made) ready to
go, the editors will put it in the repository
and publish the URL.

|
|
|