22
Copyright © 2012 Open Geospatial Consortium
This short introduction of the central idea behind tagging-based rights models reveals that a right in such a model is defined in three steps: assign
subject-tag
, assign
resource-tag
and authorized
strategy
cp. Figure 4. Depending on the requirements of the use case these three right definition steps can be performed by different groups of administrators on different
organizational levels.
Subject assi
g
n
S
T Cl
earance- a
g
Subject-Id N
1
C l
earance- a
g
-Id M
Resource assi
g
n
R
T C
l
assification- a
g
Resource-Id N
1
Cl
assification- a
g
-Id N
Action Action-Id
aut
h
orized
Strate y
L
Figure 4: Conceptual design of a tagging-based rights model
6.1.4 Rule-based Rights Models
In a rule
1
-based rights model authorizations are defined through Condition, Effects tupels that are called access control rules. The condition part defines the applicability of a
rule. If a rule’s condition expression evaluates to ‘true’ in a given context, its effects are incorporated when calculating the authorization decision.
The access control process in an access control system using a rule-base rights model can be summarized as follows: Based on interaction attempt the access control system
generates an authorization decision request ADR that defines the current evaluation context of the access control system. While evaluating the ADR the access control system
has to determine, which of the access control rules are applicable in the given evaluation context. After identifying the applicable rules, the effects of these rules are combined and
an authorization decision response is calculated.
This rough overview of the access control process in rule-based access control systems shows that every rule-based rights model also requires a corresponding evaluation
context model. The more information is included in the evaluation context model, the more powerful access rules can be defined. Evaluation context models can be designed
very application specific or very generic. Figure 5 shows a very generic evaluation context model.
1
Some literature uses the synonym term attribute-based rights model. We do not use this point-missing term as attribute is a synonym for information and it is meaningless to highlight that rights as they always do refer to
some information entities.
OGC 11-086r1r1
Copyright © 2012 Open Geospatial Consortium
23
Ev
a uation
onte
x
t as-
ategory ateory
defined-by Attribute
Attribute-Id
D
ata y
p
e AttributeVa
ue 1
N 1
N 1
X
ML-
D
oc 1
defined-by
Figure 5: Conceptual design of a generic evaluation context model
Next to the design of a conceptual and logical evaluation context model a suitable rule- based rights model needs to be developed. Figure 6 shows an example of a conceptual
rule-based rights model. The visualized model supports the definition of access control rules that must have an effect of permit or deny called the sign of a rule. Additionally
each rule can optionally have functional effects. These functional effects can e.g. cause the rewrite of an intercepted message cp. 8.3.2 or imply the augmentation of the
evaluation context by external data needed to calculate an authorization decision cp. 8.3.3.
A condition expression of an access control rule is composed of literal-, pointer- and function-expressions. Pointers are used to refer to information items in the authorization
decision requests. Rule-Container entities are “buckets“ that can hold any number of rule and rule-Container entities. Every rule-Container also has an assigned condition
expression that defines the applicability of the container. Rule-Container entities can e.g. be used to structure the policy in order to enhance the performance of the access control
process and for various other reasons.
24
Copyright © 2012 Open Geospatial Consortium
as
ontainer-Id o
m
bining-A gorit
m
is-a ondition-
ression ffect
F
unction- a
Ru e
Ru e-Id
Issuer
as
art-of
Ru e
ontainer art-of
Litera -
ression
P
ointer- ression
F
unction- ression
as 1
1 1
N
M N
N 1
1 1
Sign
as
Argu
m
ents 1
N as
as as
1 1
1
N N
N
Figure 6: Conceptual design of access control rules and rule-Containers
After the development of a suitable conceptual evaluation context model and a corresponding conceptual rule model, one has to map this model to a suitable logical
representation. A very expressive and popular logical evaluation context and rule model is e.g. defined in the eXtensible Access Control Markup Language XACML OASIS
specification [6].
6.1.5 Role-based Rights Models