next up previous contents
Next: 2.2.3 Current Research Activities Up: 2.2 Policy Work at Previous: 2.2.1 Initial Research Interest   Contents


2.2.2 Authorisation and Obligation Policies

The concept of policies was further developed and in [MoSl 91] policies were not only understood as rules for access control. In that paper, policies are intended to influence actions. Operations or actions are always characterised by a motivation and need authorisation to be performed.

Figure: Precondition for an action [Slom 94a]
\includegraphics [width=.9\textwidth]{Bilder/precond_for_action.eps}

Figure [*] shows the precondition saying that both motivation and authorisation are necessary before an operation can take place. Although they share the same precondition, motivation and authorisation are seen independently of each other. Other facts shown in figure [*] are that motivation and authorisation must have the same subject, (i.e., AgentA) which performs the operation. Also, it must have the same target (i.e., ObjectB), which is affected by the operation. As a requirement, motivation and authorisation must be stated for the same operation, i.e. OpX.


Table 2.1: Structure of a policy [SlLu 98]
\begin{table}
\sffamily identifier mode [trigger] subject \lq \{' action \lq \}' targe...
...onstraint]
[exception] \mbox{[parent]} [child] [xref] \lq ;'
\normalfont\end{table}


The general format of a policy is displayed in figure [*]. Optional attributes are within brackets. The braces and the semicolon are semantic separators. Some attributes such as trigger, subject, action, target, and constraint may be comments, in which case the policy is considered a high-level policy and it is not possible to interpret it directly. It is made up by the following attributes:

identifier
is the name of the policy.

mode
To support the different characteristics of motivation and authorisation, a mandatory modality attribute was introduced. In recent publications the term obligation is used instead of motivation. Four policy modalities are possible distinguishing between positive and negative authorisation/obligation policies.

Authorisation Policies

specify which actions a subject is permitted or prohibited to perform on a set of target objects, or which pieces of information that are being monitored can be received. Therefore, there are positive (A$+$) and negative (A$-$) forms of authorisation policies. The positive form states that an activity is allowed and the negative one states that an activity is prohibited. To perform an action, explicit authorisation is necessary, which means that non-authorised invocations are forbidden by default.

Obligation Policies

specify, given a set of target objects, what activities a subject, i.e. a person or an agent, must perform in case of the positive form (O$+$), or must not in case of the negative form (O$-$). trigger events start the enforcement of positive obligation policies.

subject
This attribute defines to whom the policy applies, i.e. which objects2.2 are authorised or obligated (responsible) to carry out the policy goal within the limits defined by the policy constraints. Subjects are usually expressed as a domain of objects and a policy applies to all objects in that domain. Authorisation policies can have a domain expression of any (see figure [*]) as subject.

action
or policy goal, which is modelled by operations, specifies what must be performed in case of obligation policies and what is permitted in case of authorisation policies. Multiple actions can also be specified.

target
specifies the objects on which the policy actions are to be performed. They are expressed with the help of domain scope expressions of objects. A policy applies to all objects specified by the domain scope expression.

constraint
limits the applicability of a policy, e.g. to a particular time period, or makes it valid after a particular date. It must be evaluated and fulfilled before a policy is to have any effect.

exception
attribute specifies alternative actions and is only allowed in the case of a positive obligation policy. With a failure of a positive obligation policy, the alternative actions are executed.

parent and child
are added automatically as part of the refinement process to create a policy hierarchy.

xref
is a manually included cross reference list to additionally reference other policies, e.g. authorisation policies that grant permission for an obligation policy.


Table 2.2: Domain scope expressions [Marr 97]
\begin{table}
\centering\sffamily\begin{tabularx}{.95\textwidth}{\vert l\vert X\...
...s without braces as a
shorthand)\\
\hline
\end{tabularx}\normalfont\end{table}



Table 2.3: Authorisation and obligation policy examples [SlLu 98]
\begin{table}
\centering\ttfamily\begin{tabularx}{.95\textwidth}{\vert X\vert}
\...
...ients when n.state!=on\_duty;
\\ \hline
\par\end{tabularx}\normalfont\end{table}


Table [*] lists the domain scope expression operators and table [*] shows some policy examples. Policies are modelled as system objects and there is a minimal set of operations defined, i.e. create, destroy, and query.

Negative authorisation policies and negative obligation policies are not semantically equivalent. Obligation policies are always interpreted by subjects, whereas authorisation policies are used by the target's support system to specify access rights.


next up previous contents
Next: 2.2.3 Current Research Activities Up: 2.2 Policy Work at Previous: 2.2.1 Initial Research Interest   Contents
Copyright Munich Network Management Team