<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling Authorization in Enterprise-wide Contexts</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matus Korman</string-name>
          <email>matusk@ics.kth.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Robert Lagerstrom</string-name>
          <email>robertl@ics.kth.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mathias Ekstedt</string-name>
          <email>mathiase@ics.kth.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>KTH Royal Institute of Technology 100</institution>
          <addr-line>44 Stockholm</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Summary. Authorization and its enforcement, access control, has stood at the beginning of the art and science of information security, and remains being a crucial pillar of secure operation of IT. Dozens of di erent models of access control have been proposed. Although enterprise architecture as a discipline strives to support the management of IT, support for modeling authorization in enterprises is lacking, both in terms of supporting the variety of individual models nowadays used, and in terms of providing a uni ed metamodel capable of exibly expressing con gurations of all or most of the models. This study summarizes a number of existing models of access control, proposes an uni ed metamodel mapped to ArchiMate, and illustrates its use on a selection of simple cases.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Character Property Domains Policy References
Mechanism any any DAC* [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
Mechanism any any DAC* [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] (p. 35)
Mechanism any OS DAC* [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] (p. 14)
Mechanism any any DAC* [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (p. 134)
Mechanism any any MAC* [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
Model any any MAC [
        <xref ref-type="bibr" rid="ref3 ref6">3, 6</xref>
        ]
Model, policy Conf:ty any MAC [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
Model, policy Integrity any MAC [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
Model, policy Integrity any MAC [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]
Model any any any [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]
Model
Model
Model
Model
any
any
any
any
any
between these approaches { conceptual modeling according to a de ned, uni ed
language.
      </p>
      <p>
        This study addresses the challenge of exibly modeling scenarios of
authorization according to the most well-known access control models, in terms of EA. The
purpose is to enable EA practitioners easily capturing authorization relations in
enterprise architectures. The study presents a number of existing access control
models in terms of conceptual modeling, and proposes a uni ed metamodel (seen
as an ontology or modeling grammar) for describing their con gurations. The
proposed uni ed metamodel is formed as a prospective extension of the popular
EA modeling language ArchiMate. Subsequently, four illustrative examples are
presented, to exemplify several di erent ways of modeling authorization, and to
demonstrate the applicability of the metamodel. Similar approach has also been
adopted by Basin et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], proposing an approach titled \model driven
security", building on an extended metamodel of RBAC [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] called SecureUML [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],
and providing a semantically well-founded modeling language and code
generation process. Somewhat similarly, the work of Gaaloul &amp; Proper [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and Gaaloul
et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] propose an access control model for use in EA modeling. However, the
approaches are exclusively based on RBAC, which makes them inapplicable for
modeling a number of other commonly used models. Slimani et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and
Mun~ante et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] propose approaches for modeling access control in a more
generic manner, however, both fall short of being able to express an arbitrary
ABAC con guration, not to mention the more recent models. This study treats
the most well-known and widely adopted models of access control, as well as
Term Description
Subject/ An entity capable of performing actions in a system under consideration
requestor (SUC). For example, a program running on an operating system.
Object/ An entity within a SUC, which is in need of protection from unauthorized
resource access. For example, an object can be a document or a system operation.
Mode The way, in which a subject can access an object within a SUC. Examples
of access are read, write, execute, delete, create, search, or list contents.
Access rule/ A rule specifying a speci c mode of access for a subject to an object {
permission/ either permitting it (more common), or by prohibiting it. In a yet more
prohibition/ generic sense, a single access rule may also specify multiple modes of
access right access for multiple subjects to multiple objects.
      </p>
      <p>User A user can be a subject, often having the privilege to further create
subjects in a SUC (e.g., run programs). A non-subject user might only be
allowed to manipulate subjects, however, not itself access objects directly.
Session A temporally constrained window of usage, typically authenticated (e.g.,
by a log-in procedure), in which a user can act within a SUC via subjects.
Classi cationA security designation of an object (e.g., a document), which indicates
e.g. the highest secrecy of information contained therein, according to
a prede ned scheme (e.g., a mathematical lattice de ning a partially
ordered set of security labels, or simpler, a full order such as in gure 3b.
Clearance A security designation of the eligibility of a subject to access object
having a certain level of classi cation, in a certain access mode. Speci cs
depend on the model of access control under consideration.</p>
      <p>Security A mark associated with an object or a subject, which carries a speci c
selabel curity meaning. A security label typically denotes a speci c classi cation
(of an object) or clearance (of an object).</p>
      <p>Attribute A characteristic of an entity such as a subject (e.g., organizational a
liation or business role), an object (e.g., minimum amount of credits needed
for access or classi cation), or the environment (e.g., time of day, threat
level or other environmental condition). It can be seen as a function that
takes as input an entity (e.g., a subject, object or the environment), and
returns a speci c value based on the properties/state of the entity.</p>
      <p>Token An attribute extended through its possible dependence on volatile,
dynamic properties or items such as cryptographic tokens (e.g., a Kerberos
token), devices (e.g., a smart card), biometric tokens, or risk tokens,
which change based on subject behavior and/or other conditions.
some prospectively powerful newcomers, and proposes a unifying metamodel
mapped to ArchiMate.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Access control: concepts and models</title>
      <p>This section introduces the terms speci c to access control used throughout the
paper (table 2), and brie y describes the models of access control treated.</p>
      <p>A distinction between an access control model, policy, and mechanism should
be made. While the rst describes an access control system, the second describes
a set of requirements for the system, and the third describes a part of an
implementation of the system. Table 1 summarizes the access control models, policies
and mechanisms treated within this study.</p>
      <p>
        Discretionary access control (DAC, gure 1a) models are based on the
identity of subjects and access rules stating what the subject can and/or shall not
do. Subjects can decide over other subjects' permissions (access rules) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. DAC
is likely the most prevalent access control model today, thanks to its simplicity
and extensive legacy. An example of DAC can be found in a typical Windows or
UNIX lesystem. The most common representation of a DAC con guration is an
access control matrix [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which is in practice typically represented by multiple
access control lists (ACL) (see [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], p. 35) or capability tickets [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Mandatory access control (MAC, gure 1b) models have largely become
synonymous with the term lattice-based access control [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the security levels of
which are structured as a lattice. The Bell-LaPadula (BLP) model [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and Biba
model [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] use need-to-know categories (e.g, project numbers) for regulating
access to objects in a DAC-like fashion, and security labels denoting security levels
for classi cation of objects and clearance of subjects. Both models consider two
modes of access { reading and modi cation. Biba additionally considers
invocation (i.e., calling upon another subject) which can consequentially be viewed
as modi cation under the invoked subject's clearance. However, while BLP
addresses con dentiality, Biba addresses integrity. In BLP, reading an object is
allowed to a subject if the subject's clearance is equal or higher than the
object's classi cation, and writing it allowed if it is equal or lower. In Biba, reading
an object is allowed if the subject's clearance is equal or lower than the object's
classi cation, and writing (and invocation) is allowed if it is equal or higher.
Although the di erence between BLP and Biba makes the two policies con icting,
they can be combined given separate labels for con dentiality and integrity [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
The Brewer-Nash model [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] (Chinese wall, gure 1c) di ers in that its con
guration changes dynamically according to the history of each subject's access.
The model de nes a term con ict-of-interest class, which groups datasets, or
rather object sets (e.g., data of di erent banks), and regulates access as follows.
A subject can read an object only if the object is in the same object set as an
object already accessed by the subject, or if the object belongs to an entirely
di erent con ict-of-interest class. A subject can write [to] an object only if it
also can read the object, and if no such object can be read that is in a di erent
object set from the one for which write access is requested and which at the
same time contains unsanitized (i.e., not anonymized) information.
      </p>
      <p>
        Role-based access control (RBAC, gure 1d) [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ] is technically a
nondiscretionary model, in which subjects are granted access based on the roles they
take on themselves for a speci c session (e.g., Jane can take on herself the role of
a system administrator, a nancial analyst, or a teller). Several types of RBAC
have been identi ed [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] according to their features. RBAC0 denotes a minimal
version, in which a subject can only take on itself a single role for a session, and
there are no constraints for separation of duty. RBAC1 augments RBAC0 with
hierarchies of role inclusion, in form of a partially ordered set. RBAC2 augments
RBAC0 with constraints (e.g., expressing that a subject must not be assigned
two speci c roles at the same time). RBAC3 combines RBAC1 and RBAC2,
which also enables constraining for dynamic separation of duty (e.g., a subject
must not take on itself two speci c roles within a single session).
      </p>
      <p>
        Attribute-based access control (ABAC, gure 1e) [
        <xref ref-type="bibr" rid="ref10 ref13">10, 13</xref>
        ] is one of the
more recent models, which, although being the fastest growing one [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and
seemingly on the verge of a large-scale adoption [
        <xref ref-type="bibr" rid="ref15 ref26">15, 26</xref>
        ], is not yet as widely
known as RBAC. Its major advantages over DAC, MAC and RBAC, are far
greater expressiveness, richness, greater precision and exibility. In fact, ABAC
no longer requires specifying individual relationships between subjects and
objects [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. On top of ABAC, UCON [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] proposes mutable attributes (changeable
as a consequence of access in addition to administrative actions), predicates that
have to be evaluated prior to a usage decision (authorizations ), and predicates
that verify mandatory requirements for access (obligations ). The invention of
ABAC has been preceded by numerous extensions to RBAC (e.g., by spatial,
temporal, task-, organization- and decision-related aspects), however, this study
does not treat them in favor of the more generic ABAC.
      </p>
      <p>
        Risk-adaptive and token-based access control (RAdAC [
        <xref ref-type="bibr" rid="ref17 ref18">17,18</xref>
        ], TBAC
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]) have been proposed in the recent years. On top of ABAC, RAdAC considers
measures of risk related to access decisions, which can be arbitrary (e.g., based on
subjects' behavior and trust; ways, probabilities and consequences of misusing
objects; environmental conditions). TBAC, although not having received
academic attention, broadens the perspectives of application and implementation
of ABAC and RAdAC in a way highly relevant for EA practice and modeling.
Example tokens are listed in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3 Metamodel for modeling authorization</title>
      <p>The uni ed metamodel for modeling authorization is depicted in gure 2. Below,
this section rst describes the metamodel, motivating certain features of its
design, and later provides a set of illustrative examples, each showing the use of
the metamodel through a corresponding model of a concrete con guration of a
certain access control model.</p>
      <p>
        Structurally and syntactically, the uni ed metamodel mostly resembles that
of ABAC (cf. gure 1e), thank to ABAC's ability to encompass or emulate most
of the other access control models' function. For structural simplicity however,
the entity Attribute semantically comprises both attribute from ABAC and
token as used in TBAC. Also, items such as role or clearance can be
modeled simply as an attribute. For more clarity however, the uni ed metamodel
retains a number of such entities, namely Role, User attribute, Clearance,
Classification and Conflict-of-interest class, since those are expected
to occur commonly. Less generally common such entities (e.g., predetermined
explicit authorization or location) can be instantiated from the closest tting
child class of Attribute rather than having a separate class. Role, unlike other
children of Attribute, allows the modeler to de ne arbitrary partial orders, to
capture con gurations of RBAC1,3 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Since the name of a modeled attribute
might not su ce to capture its full nature and its range of values, the
modeler can further specify attributes textually (e.g., by free text or references),
using Attribute specification. At the same time, the modeler can specify
partial orders (e.g., lattices) of attribute values using Attribute value and
group them into sets (e.g., for security levels and need-to-know categories),
using Attribute value set. Moreover, attribute values can be linked to
instances of ArchiMate's Passive structure element, to denote values that
might already be modeled using ArchiMate. An Object can group arbitrary
sets of ArchiMate's Core elements. Subject gures as a child of Object, since
a subject itself can be an object. Subject, much like Attribute, is also
further categorized into the commonly occurring Owner, Group, World (i.e.,
anyone), and even User denoting a an intelligent actor (e.g., human), for the case
its distinction from Subject is desirable to model. Access rule can connect
to a Subject and an Object, although it is not necessary, e.g., in case of
ABAC. Access rule can relate to Attributes of any kind, also multiple ones.
It can also relate to ArchiMate's Active structure element, e.g., to denote
dependency on a system that realizes its enforcement etc. As with Attribute
specification, Rule specification can help further specify an Access rule.
Finally, an Access rule might be a part of a speci c Access policy. Various
authorization constraints (e.g., cf. RBAC2 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]) might need to be modeled, using
Authorization constraint. Similarly to Access rule, the modeler can also
relate an Authorization constraint to an Access policy. Finally, three
patterns occur repeatedly in the design of the proposed uni ed metamodel. First,
a speci c form of grouping is used at Attribute, Subject and Object
represented by ArchiMate's Core element: The grouping entity (titled a -set or
-group), inherits from its immediate base entity, and aggregates a set of its
instances. This allows arbitrary tree-like grouping under the name of the base
entity (e.g., Subject). Second, relations of partial order allow the modeler to
create arbitrary lattice-like hierarchies. Third, multiplicities of relations are highly
permissive, and in most cases allow 0..* rather than the more constraining 0..1
or 1..*, to provide higher exibility. The proposed metamodel includes bindings
to ArchiMate entities, in gure 2 distinguished from others using dashed lines.
Following, four illustrative examples of the metamodel's usage are presented.
      </p>
      <p>Example of DAC: File system ( gure 3a). Let us have a school computer
le system, one teacher and two students. The students, belonging to a group
called \Students", are allowed to read contents of the course study directory, and
execute a program for exam submission. The teacher, belonging to a group called
\Teachers", is allowed to read and write grade records, and read the contents of
an exam directory, which stores exams submitted by students.</p>
      <p>
        Example of MAC: BLP multilevel security ( gure 3b). Let us have
an environment with multilevel security policy according to the Bell-LaPadula
model [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Let us only consider a single group of users called \Department o
cials" and their authorizations to read and append to protected documents.
      </p>
      <p>Example of RBAC: Request tracking system ( gure 3c). Let us have a
request tracking system with two types of objects { system settings and request
records, a few users, a group representing customers, and four roles, each having
di erent access: system administrator, customer, request handler and revisor.
Further, let it be forbidden to combine the roles of handler and revisor.</p>
      <p>Example of ABAC/RAdAC/TBAC: Insurance application system
( gure 3d). Let us have an automated processing of insurance applications in
an insurance company. Let the company use a risk token, which calculates risk
value for each customer based on the customer's history; and let there be a risk
appetite setpoint providing a threshold for how risky a deal the company can
sign at a given moment. Let the system register the customer's insurance request
as an user attribute automatically upon the customer applying through a
webbased form. Finally, let us only allow the system to invoke an insurance signage
service if the insurance application is valid, and if the risk that the signed deal
would pose to the company does not exceed the risk appetite.</p>
    </sec>
    <sec id="sec-4">
      <title>4 Discussion and conclusions</title>
      <p>The proposed metamodel o ers a high degree of modeling exibility, which
emerges mainly from the presence of four features: (1) broad possibility to group
items or present them as groups/sets (e.g., attributes, subjects, objects) with the
possibility of introducing further detail; (2) the possibility to arbitrarily
textually specify attributes, attribute values, access rules, policies and constraints; (3)
the conceptual redundancy provided (e.g., the modeler can model a DAC or a
RBAC model both as an ABAC model, or entirely avoiding the use of attributes
in the former case while making use of Role in the latter case; (4) the possibility
to exploit the permissive cardinality constraints to make abstractions similar to
grouping, and so to reduce the number of modeled instances and connections.</p>
      <p>Although the generalizability of the metamodel to all existing models of
access control is di cult to evaluate, the consideration of well-known and highly
generic models of access control such as ABAC provides outlook for a high degree
of generalizability of the proposal. Similar concern relates to how applicable will
the metamodel remain over time, which depends on the amount of innovation
taking place within the domain of access control.</p>
      <p>
        Although the proposed metamodel of this study shares many conceptual
likenesses with the results of Gaaloul &amp; Proper [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], Gaaloul et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], Basin et
al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], Slimani et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and Mun~ante et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], it surpasses these works
in terms of the breadth of coverage of the di erent existing models of access
control. Additionally, this study shares much likeness in terms of its ArchiMate
mapping compared to that proposed in Gaaloul &amp; Proper [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. However, the
latter is more direct and constraining (e.g., the entity User inherits from
ArchiMate's Business actor and Role inherits from ArchiMate's Business role,
rather than associating with them), which leads to lesser modeling exibility in
comparison to the mapping proposed in this study.
      </p>
      <p>In terms of conceptual modeling, this study has summarized a number of
relevant models of access control including a few recent ones, presented an
ArchiMate-mapped uni ed metamodel capable of expressing con gurations of
all the individual models of access control treated, and nally provided four
illustrative examples of using the metamodel in distinct scenarios.</p>
      <p>In the future, enriching the uni ed metamodel with automated analysis is
intended, enabling the metamodel to warn about risky patterns of con guration,
or deviations from best practice. Additionally, the metamodel could analyze
attributes related to a given access control implementation and con guration,
enterprise needs and maintenance processes (e.g., cost, amount of maintenance,
modi ability or security through the likelihood of being in a state of miscon
guration), and so help enterprises optimize their architecture.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. The Open Group:
          <article-title>ArchiMate 2.1 Speci cation</article-title>
          ,
          <source>Technical Standard</source>
          . Van Haren Publishing, Zaltbommel, http://www.opengroup.org/archimate/ (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Lampson</surname>
            ,
            <given-names>B.W.</given-names>
          </string-name>
          : Protection.
          <source>ACM SIGOPS Operating Systems Review</source>
          <volume>8</volume>
          (
          <issue>1</issue>
          ) (
          <year>1974</year>
          )
          <volume>18</volume>
          {
          <fpage>24</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Biba</surname>
            ,
            <given-names>K.J.:</given-names>
          </string-name>
          <article-title>Integrity considerations for secure computer systems</article-title>
          .
          <source>Technical report, DTIC Document</source>
          (
          <year>1977</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferraiolo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          :
          <article-title>Assessment of access control systems</article-title>
          .
          <source>US Department of Commerce, National Institute of Standards and Technology</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Stallings</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
          </string-name>
          , L.:
          <source>Computer Security: Principles and Practice</source>
          .
          <volume>2</volume>
          <fpage>edn</fpage>
          . Pearson
          <string-name>
            <surname>Education</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Sandhu</surname>
          </string-name>
          , R.S.:
          <article-title>Lattice-based access control models</article-title>
          .
          <source>Computer</source>
          <volume>26</volume>
          (
          <issue>11</issue>
          ) (
          <year>1993</year>
          )
          <volume>9</volume>
          {
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bell</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LaPadula</surname>
          </string-name>
          , L.J.:
          <article-title>Secure computer systems: Mathematical foundations</article-title>
          .
          <source>Technical report, DTIC Document</source>
          (
          <year>1973</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Brewer</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nash</surname>
            ,
            <given-names>M.J.:</given-names>
          </string-name>
          <article-title>The chinese wall security policy</article-title>
          .
          <source>In: Security and Privacy</source>
          ,
          <year>1989</year>
          . Proceedings.,
          <source>1989 IEEE Symposium on, IEEE</source>
          (
          <year>1989</year>
          )
          <volume>206</volume>
          {
          <fpage>214</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sandhu</surname>
          </string-name>
          , R.S.:
          <article-title>Lattice-based enforcement of chinese walls</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>11</volume>
          (
          <issue>8</issue>
          ) (
          <year>1992</year>
          )
          <volume>753</volume>
          {
          <fpage>763</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Ferraiolo</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavrila</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chandramouli</surname>
          </string-name>
          , R.:
          <article-title>Proposed nist standard for role-based access control</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC) 4</source>
          (
          <issue>3</issue>
          ) (
          <year>2001</year>
          )
          <volume>224</volume>
          {
          <fpage>274</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coyne</surname>
            ,
            <given-names>E.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feinstein</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Youman</surname>
            ,
            <given-names>C.E.</given-names>
          </string-name>
          :
          <article-title>Role-based access control models</article-title>
          .
          <source>Computer</source>
          <volume>29</volume>
          (
          <issue>2</issue>
          ) (
          <year>1996</year>
          )
          <volume>38</volume>
          {
          <fpage>47</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferraiolo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schnitzer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandlin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scarfone</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Guide to attribute based access control (abac) de nition and considerations</article-title>
          .
          <source>NIST Special Publication</source>
          <volume>800</volume>
          (
          <year>2014</year>
          )
          <fpage>162</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Jin</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krishnan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A uni ed attribute-based access control model covering dac, mac and rbac</article-title>
          .
          <source>In: Data and applications security and privacy XXVI</source>
          . Springer (
          <year>2012</year>
          )
          <volume>41</volume>
          {
          <fpage>55</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferraiolo</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          :
          <article-title>Attribute-based access control</article-title>
          .
          <source>Computer</source>
          <volume>48</volume>
          (
          <issue>2</issue>
          ) (
          <year>February 2015</year>
          )
          <volume>85</volume>
          {
          <fpage>88</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Wagner</surname>
          </string-name>
          , R.:
          <article-title>Identity and access management 2020</article-title>
          . http://www.issa.org/ resource/resmgr/JournalPDFs/feature0614.pdf (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The ucon abc usage control model</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC) 7</source>
          (
          <issue>1</issue>
          ) (
          <year>2004</year>
          )
          <volume>128</volume>
          {
          <fpage>174</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>McGraw</surname>
            ,
            <given-names>R.W.</given-names>
          </string-name>
          :
          <article-title>Risk-adaptable access control (radac)</article-title>
          .
          <source>In: Privilege (Access) Management Workshop. NIST{National Institute of Standards and Technology{ Information Technology Laboratory</source>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Shaikh</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Logrippo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Dynamic risk-based decision methods for access control systems</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>31</volume>
          (
          <issue>4</issue>
          ) (
          <year>2012</year>
          )
          <volume>447</volume>
          {
          <fpage>464</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Radhakrishnan</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The fth and nal frontier of access control model</article-title>
          . http://www.isaca-washdc.org/presentations/2012/201211-session3_ article.pdf (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Basin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doser</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lodderstedt</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Model driven security: From uml models to access control infrastructures</article-title>
          .
          <source>ACM Transactions on Software Engineering and Methodology (TOSEM) 15(1)</source>
          (
          <year>2006</year>
          )
          <volume>39</volume>
          {
          <fpage>91</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Lodderstedt</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doser</surname>
          </string-name>
          , J.:
          <article-title>Secureuml: A uml-based modeling language for model-driven security</article-title>
          .
          <source>In: UML 2002 - The Uni ed Modeling Language</source>
          . Springer (
          <year>2002</year>
          )
          <volume>426</volume>
          {
          <fpage>441</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Gaaloul</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proper</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An access control model for organisational management in enterprise architecture</article-title>
          .
          <source>In: Semantics, Knowledge and Grids (SKG)</source>
          ,
          <year>2013</year>
          Ninth International Conference on,
          <source>IEEE</source>
          (
          <year>2013</year>
          )
          <volume>37</volume>
          {
          <fpage>43</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gaaloul</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guerreiro</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proper</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Modeling access control transactions in enterprise architecture</article-title>
          .
          <source>In: Business Informatics (CBI)</source>
          ,
          <source>2014 IEEE 16th Conference on. Volume</source>
          <volume>1</volume>
          ., IEEE (
          <year>2014</year>
          )
          <volume>127</volume>
          {
          <fpage>134</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Slimani</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khambhammettu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Logrippo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Uacml: Uni ed access control modeling language</article-title>
          .
          <source>In: New Technologies, Mobility and Security (NTMS)</source>
          ,
          <year>2011</year>
          4th IFIP International Conference on,
          <source>IEEE</source>
          (
          <year>2011</year>
          ) 1{
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Munante</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gallon</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aniorte</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An approach based on model-driven engineering to de ne security policies using orbac</article-title>
          .
          <source>In: Availability, Reliability and Security (ARES)</source>
          , 2013 Eighth International Conference on,
          <source>IEEE</source>
          (
          <year>2013</year>
          )
          <volume>324</volume>
          {
          <fpage>332</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The future of access control: Attributes, automation and adaptation</article-title>
          . http://profsandhu.com/miscppt/coimbatore_131219.
          <string-name>
            <surname>pdf</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>