Towards a times-based usage control model

  • Authors:
  • Baoxian Zhao;Ravi Sandhu;Xinwen Zhang;Xiaolin Qin

  • Affiliations:
  • George Mason University, Fairfax, VA;Institute for Cyber-Security Research, Univ. of Texas at San Antonio;Samsung Information Systems America, San Jose, CA;Nanjing University of Aeronautics and Astronautics, Nanjing, China

  • Venue:
  • Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Modern information systems require temporal and privilege-consuming usage of digital objects. To meet these requirements, we present a new access control model-Times-based Usage Control (TUCON). TUCON extends traditional and temporal access control models with times-based usage control by defining the maximum times that a privilege can be exercised. When the usage times of a privilege is consumed to zero or the time interval of the usage is expired, the privilege exercised on the object is automatically revoked by the system. Formal definitions of TUCON actions and rules are presented in this paper, and the implementation of TUCON is discussed.