290 likes | 552 Views
UCON Model . 51000448 - Huỳnh Châu Duy. OUTLINE. UCON MODEL. Traditional access control. Mandatory Access Control (MAC) Discretionary Access Control (DAC) Role Based Access Control (RBAC) Focus in a closed system environment
E N D
UCON Model 51000448 - HuỳnhChâuDuy
Traditional access control • Mandatory Access Control (MAC) • Discretionary Access Control (DAC) • Role Based Access Control (RBAC) • Focus in a closed system environment • Not adequate for today’s distributed, network-connected digital environment. • Authorization only • Decision is made before access • No consumable rights • Rights are pre-defined and granted to subjects
DIGITAL RIGHT MANAGEMENT(DRM) • Controlling and tracking access to and use of digital information objects at client-side. • Mainly focus on intellectual property rights protection. • Lack of access control model.
UCONABC MODEL COMPONENTS • Subjects • Attributes • Consumer Subjects • Provider Subjects • Identifiee Subjects • Objects • Attributes • Rights
AUTHORIZATIONS • Functional predicates that have to be evaluated for usage decision. • Return whether the subject(requester) is allowed to perform the requested rights on the object. • Authorizations can be either pre-authorizations (preA) or ongoing-authorizations (onA).
OBLIGATIONS • Functional predicates that verify mandatory requirements a subject has to perform before or during a usage exercise. • Obligations can be either pre-obligations (preB) or ongoing-obligations (onB)
CONDITIONS • Environmental or system-oriented decision factors. • Unlike authorizations or obligations, condition variables cannot be mutable. • Evaluation of conditions cannot update any subject or object attributes.
CORE MODEL The 16 basic UCONABC models
CORE MODEL Example : - Pay-per-view (preUpdate) - Metered payment (postUpdate)
CORE MODEL Example : Pay-per-Minutes
CORE MODEL Example : Free Internet Service
CORE MODEL • Example : • Healthcare • Education • Long-distance phone • Pre-paid phone card • Click Ad within every 30 minutes • Business Hour
CONSLUSION • UCONABC leaves open the architecture and mechanisms for providing trusted attributes.