Skip to main navigation Skip to search Skip to main content

On the management of user obligations

  • Murillo Pontual
  • , Omar Chowdhury
  • , William H. Winsborough
  • , Ting Yu
  • , Keith Irwin
  • University of Texas at San Antonio
  • North Carolina State University
  • Winston-Salem State University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

This paper is part of a project investigating authorization systems that assign obligations to users. We are particularly interested in obligations that require authorization to be performed and that, when performed, may modify the authorization state. In this context, a user may incur an obligation she is unauthorized to perform. Prior work has introduced a property of the authorization system state that ensures users will be authorized to fulfill their obligations. We call this property accountability because users that fail to perform authorized obligations are accountable for their non-performance. While a reference monitor can mitigate violations of accountability, it cannot prevent them entirely. This paper presents techniques to be used by obligation system managers to restore accountability. We introduce several notions of dependence among pending obligations that must be considered in this process. We also introduce a novel notion we call obligation pool slicing, owing to its similarity to program slicing. An obligation pool slice identifies a set of obligations that the administrator may need to consider when applying strategies proposed here for restoring accountability. The paper also presents the system architecture of an authorization system that incorporates obligations that can require and affect authorizations.

Original languageEnglish
Title of host publicationSACMAT'11 - Proceedings of the 16th ACM Symposium on Access Control Models and Technologies
Pages175-184
Number of pages10
DOIs
StatePublished - 2011
Event16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011 - Innsbruck, Austria
Duration: Jun 15 2011Jun 17 2011

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Conference

Conference16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011
Country/TerritoryAustria
CityInnsbruck
Period06/15/1106/17/11

Keywords

  • Accountability
  • Authorization
  • Obligations
  • Policy
  • RBAC

Fingerprint

Dive into the research topics of 'On the management of user obligations'. Together they form a unique fingerprint.

Cite this