Supporting Secure Embedded Access Control Policy with XACML+XML Security

XACML has become the de facto standard for expressing access control policy. Similarly, XML security standards, such as XML encryption and XML digital signature, have been widely deployed for protecting the confidentiality, authenticity and integrity of digital information. In this paper we present a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy. The basic idea is to extend XACML such that access control policy can be embedded with the digital content in the same XACML document. The original content can be further divided into multiple parts, each of which is encapsulated by its own access control policy. The integrated XACML policy and content document is further protected using XML encryption and digital signature. This framework and associated security methods are designed to facilitate the protection, management and sharing of sensitive information.

[1]  Kai Chen,et al.  An XACML Policy Generating Method Based on Policy View , 2008, 2008 Third International Conference on Pervasive Computing and Applications.

[2]  Bhavani Thuaisingham,et al.  Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners , 2009, ACM Asia Conference on Computer and Communications Security.

[3]  Christoph Meinel,et al.  A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control , 2009, 2009 IEEE International Conference on Web Services.

[4]  Rakesh Bobba,et al.  PBES: a policy based encryption system with application to data sharing in the power grid , 2009, ASIACCS '09.

[5]  Lisa M. Marvel,et al.  Using XACML for Embedded and Fine-Grained Access Control Policy , 2009, 2009 International Conference on Availability, Reliability and Security.

[6]  George Wilson,et al.  Extending Linux for Multi-Level Security , 2007 .

[7]  Lisa M. Marvel,et al.  Integrated mandatory access control for digital data , 2008, SPIE Defense + Commercial Sensing.

[8]  Edgar R. Weippl,et al.  XML security - A comparative literature review , 2008, J. Syst. Softw..

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.