|  
      
     | 
     
         
     | 
     
      
         
          |   | 
         
         
           
            
            
               
                 
                |   
                  
OASIS eXtensible Access Control Markup Language TC                 | 
 
                     
|  Defining XACML, an XML specification for expressing policies for information access over the Internet | 
 
                    | 
 
              | 
 
         
      
         
        
          
            
             
            
            Submissions and Position Papers 
            Slides 
            
              - F2F#4
              
                - XML resource protection use case(pdf,word), by Michiharu Kudo
              
  
               - F2F#3 
              
                - J2SE use case(.pdf), by Sekhar Vajjhala 
                
 - Boolean Policy Resolution(text), 
                by Ann Anderson 
                
 - Thoughts on Proposal 0.8 (.ppt), 
                by Hal Lockhart 
                
 - Triple-based policy schema proposal, by Simon Godik 
  
               - F2F#2 
              
                - What needs to be specified by the XACML model?(.pdf), 
                by Pierangela Samarati 
                
 - Use Case and Requirement(.ppt),(.pdf), 
                by Michiharu Kudo 
  
               - F2F#1 
              
                - Slides for F2F#1, Medical Use Case(.ppt), 
                by Fred Moses 
                
 - Slides for F2F#1, Overview of XACL(.zip), 
                by Michiharu Kudo 
                
 - Slides for F2F#1, Preliminary Proposal(.ppt), 
                by Tim Moses 
    
            Domain Model 
            
              - XACML Domain Model ver.3(.doc), 
              by Gilbert Pilz 
  
            Policy Model 
            
              - What needs to be specified by the XACML policy model?(.doc)(.htm), 
              by Ernesto Damiani and Pierangela Samarati 
  
            Language Proposal 
            
              - XACML Policy Proposal (.doc), 
              by Carlisle Adams 
  
            Use Cases 
            
              - OASIS ebXML Registry-Access Control Related Use Cases(.doc), 
              by Suresh Damodaran 
              
 - ebXML Registry Access Control Use Case: Issues(.doc), 
              by Suresh Damodaran 
              
 - Medical Use Cases(.doc), 
              by Meg Kistin Anzalone and Fred Moses 
              
 - Use Cases for Access control on XML Resources(.doc), 
              by Michiharu Kudo 
              
 - XACML DRM Use Case Proposal(.pdf), 
              by Thomas Hardjono 
              
 - Online Server Usecases(.doc), 
              by Hal Lockhart 
              
 - Financial Regulatory Usecases(.doc), 
              by Simon Blackwell 
  
            Others 
            
              - Requirements for a Rights Data Dictionary and Rights 
              Expression Language(.doc), 
              by David Parrott 
              
 - Report on Reuters Response to MPEG-21 CfR(.ppt), 
              by David Parrott
 Powerpoint slides presented by Dr David 
              Parrott (Reuters) to the XACML Committee on 18 July 2001. 
              
             
             
            
            Patents 
            The following U.S. Patents 
            may be relevant to XACML work: 
            
              - 5,715,403 System for controlling the distribution and use of 
              digital works having attached usage rights where the usage rights 
              are defined by a usage rights grammar 
              
 - 5,629,980 System for controlling the distribution and use of 
              digital works 
              
 - 5, 638, 443 System for Controlling the Distribution and Use of 
              Composite Digital Works 
  
             
             
            
            Auxiliary Resources 
            The following works have substantial overlap with XACML: 
            
            The following external resources have been identified as useful 
            for the TC's work: 
            
              - RFC 3060: Policy Core Information Model, Internet Society, 
              Network Working Group
 Brief summary by Bill 
              Parducci, RFC3060 presents the object-oriented information 
              model for representing policy information developed jointly in the 
              IETF Policy Framework WG and as extensions to the DMTF CIM. This 
              model defines two hierarchies of object classes: structural 
              classes representing policy information and control of policies, 
              and association classes that indicate how instances of the 
              structural classes are related to each other. Two fundamental 
              design parameters are: (1) the primary use of the declaritive (vs. 
              procedural) policy model; (2) self imposed limitations in richness 
              of expression for ease of implementation and use. 
              
               - RDF: A lightweight 
              ontology system to support knowledge exchange on the Web 
              
 - IRTF AAA 
              Architecture  group RFCs: 
              
                - RFC 
                2903: Generic AAA Architecture 
                
 - RFC 
                2904: AAA Authorization Framework 
                
 - RFC 
                2905: AAA Authorization Application Examples 
                
 - RFC 
                2906: AAA Authorization Requirements 
                
 - A 
                grammar for Policies in a Generic AAA Environment
 In 
                this document a formal model of a language to describe policies 
                is presented in the context of a generic AAA environment. The 
                document introduces the concept of a Driving Policy. A Driving 
                Policy specifies the behavior of an 'AAA' server (composed of a 
                Rule Based Engine, Policy Repository and Application Specific 
                Module). A key aspect of a Driving Policy is that it be dynamic 
                in nature, as even minor changes in the Policy Repository or 
                Application Specific Module may significantly affect the 
                behavior of the server. Identified but not resolved, are the 
                complexities that arise from external policies (e.g. being 
                pushed from the user in a request). Syntactical ambiguities 
                resulting from policy nesting are noted with possible solutions 
                said to be forthcoming.   
               - CORBA Security Specification
 
              
               - MPEG4 & MPEG21 Requirements docs
 
              
               - Access Control Models
 
                
            Academic papers related to the TC's work: 
            
              - ``Securing 
              XML Documents,'': E. Damiani, S. De Capitani di Vimercati, S. 
              Paraboschi, P. Samarati, Proc. of the 2000 International 
              Conference on Extending Database Technology (EDBT2000), Konstanz, 
              Germany, March 27-31, 2000 
              
 - ``Design 
              and Implementation of an Access Control Processor for XML 
              Documents'': E. Damiani, S. De Capitani di Vimercati, S. 
              Paraboschi, P. Samarati, Computer Networks, vol. 33, no. 1-6, 
              2000, pp. 59-75; and Proc. of the Ninth International World Wide 
              Web Conference (WWW9), Amsterdam, May 15-19, 2000.
 These are 
              the papers that present our fine-grained access control for XML 
              documents. 
               - ``Fine-Grained 
              Access Control for SOAP E-Services,'': E. Damiani, S. De 
              Capitani di Vimercati, S. Paraboschi, P. Samarati, Proc. of the 
              Tenth International World Wide Web Conference (WWW10) , Hong Kong, 
              May 1-5, 2001.
 This paper presents an extension to our 
              access control system for regulating access to SOAP e-services. 
              The approach is based on intercepting and filtering requests. 
               - ``Flexible 
              Support for Multiple Access Control Policies,'': S. Jajodia, 
              P. Samarati, M.L. Sapino, and V.S. Subrahmanian, ACM Transactions 
              on Database Systems, to appear.
 It presents a logic-based 
              language for expressing security policies. 
               - ``An 
              Algebra for Composing Access Control Policies,'': P. Bonatti, 
              S. De Capitani di Vimercati, and P. Samarati, ACM Transactions on 
              Information and System Security, to appear.
 It presents an 
              algebra for expressing complex policies characterized by merging 
              different components that need to be maintained independently. 
               - ``Regulating 
              Service Access and Information Release on the Web,'': P. 
              Bonatti, P. Samarati, Proc. 7th ACM Conference on Computer and 
              Communications Security, Athens, Greece, November 1-4, 
              2000.
 It presents a security model for regulating access in 
              an open distributed environments where clients may not been known 
              apriori to servers. It supports certificate-based authorizations. 
              It also addresses the problem of security policy communication 
              between server and client (as the server needs to tell the clients 
              which certificates may be necessary for an access). 
               - ``An 
              Access Control Model for Data Archives,'': P. Bonatti, E. 
              Damiani, S. De Capitani di Vimercati, P. Samarati, IFIP-TC11 
              International Conference on Information Security, Paris, France, 
              June 11-14, 2001.
 It presents an access control for 
              regulating access to data archives. The goal there was to present 
              a solution that was expressive enough to cover the requirements 
              gathered by the partners but at the same time simple. Particular 
              attention was devoted to the language for specifying 
              authorizations. You can see this as an input for use cases (as the 
              solution was based on protection requirements collected from 
              users). 
               - ``Access 
              Control: Policies, Models, and Mechanisms,'': P. Samarati and 
              S. De Capitani di Vimercati, Foundations of Security Analysis and 
              Design, R. Focardi and R. Gorrieri (eds), LNCS 2172, 
              Springer-Verlag.
 Survey chapter on security policies and 
              models. 
               - ``XML 
              Document Security Based on Provisional Authorization'': M. 
              Kudo and S. Hada, Proc. 7th ACM Conference on Computer and 
              Communications Security, Athens, Greece, November 1-4, 
              2000.
 It presents overview of XACL language and a proposed 
              notion of provisional authorization. 
               - S. Jajodia, M. Kudo, and V. S. Subrahmanian, Provisional 
              Authorization, E-Commerce Security and Privacy, Anup Ghosh, ed., 
              Kluwer Academic Publishers, Boston, 2001, pages 133--159.
 It 
              presents a formal model for provisional authorization based on 
              logic-programming. 
               - Policies for 
              Network and Distributed Systems Management 
              
 - The 
              Policy Framework (brief intro; worth reading) 
              
 - Ponder 
              A Policy Language for Distributed Systems Management 
              
 - ``The 
              Ponder Specification Language'': N. Damianou, N. Dulay, E. 
              Lupu, M Sloman, Workshop on Policies for Distributed Systems and 
              Networks (Policy2001), HP Labs Bristol, 29-31 Jan 
              2001.
 Ponder Summary Paper 
               - ``A 
              Policy Deployment Model for the Ponder Language,'': N. Dulay, 
              E. Lupu, M Sloman, N. Damianou, An extended version of paper in 
              Proc. IEEE/IFIP International Symposium on Integrated Network 
              Management (IM?2001), Seattle, May 2001, IEEE Press.
 Ponder 
              Deployment Paper 
               - Ponder 
              Language Specification 
              
 - Ponder 
              SableCC grammar 
              
 - Ponder 
              Software Main Page 
              
 - Securing XML Documents with 
              Author-X: E. Bertino, S. Castano, E. Ferrari,IEEE Internet 
              Computing, Maggio/Giugno 2001. 
              
 - On specifying security policies 
              for web documents with an XML-based Language: E. Bertino, S. 
              Castano, E. Ferrari, Proc. of SACMAT'2001, ACM Symposium on Access 
              Control Models and Technologies, Fairfax, VA, May 2001. 
              
 - E. Bertino, S. Castano, E. Ferrari. Securing XML Documents: 
              the Author-X Project Demonstration, In Proc. of ACM SIGMOD 2001 
              Conference, Santa Barbara, CA, USA, Maggio 2001. 
              
 - E. Bertino, S. Castano, E. Ferrari, M.Mesiti, Specifying and 
              Enforcing Access Control Policies for XML Document Sources, World 
              Wide Web Journal, Baltzer Science Publishers, Vol.3, N.3, 2000. 
              
 - E. Bertino, S. Castano, E. Ferrari, M.Mesiti, Author-X: a 
              Java-Based System for XML Data Protection, in Proc. of the 14th 
              Annual IFIP WG. 11.3 Working Conference on Database Security, 
              Schoorl (near Amsterdam), The Netherlands, August 2000. 
              
 - E. Bertino, S. Castano, E. Ferrari, M. Mesiti, Controlled 
              Access and Dissemination of XML Documents, in Proc. of ACM CIKM'99 
              2nd Workshop on Web Information and Data Management (WIDM'99), 
              Kansas City, Missouri, USA, November 1999. 
              
 - A. Gabillon, E. Bruno, Regulating 
              Access to XML documents, Fifteenth Annual IFIP WG 11.3 Working 
              Conference on Database Security. Niagara on the Lake, Ontario, 
              Canada July 15-18, 2001. 
   
             
            
              Procedure 
              TC members should note the following procedure for publishing 
                    documents to the repository: 
              
                - 
                  
If your submission is covered by the document guidelines, 
                    try to ensure that it follows the  
                    guidelines (especially regarding file format and 
                    file name). 
                 
                - 
                  
Send mail to the xacml-editors 
                    list, attaching the submission and indicating the 
                    list(s) to which the eventual URL(s) should be published. 
                  
                    - 
                      
If the submission needs further work with respect 
                        to the guidelines, and the folks on the xacml-editors 
                        list can't perform this work themselves, they'll 
                        return it to you with their requests. 
                     
                    - 
                      
If the submission is (or can be made) ready to 
                        go, the editors will put it in the repository 
                        and publish the URL. 
                     
                   
                 
               
             
              
           | 
         
        
          |   | 
         
        
       
     |