Usage Control in Ubiquitous Communication

The project started in 2009 and ended in 2011. It was carried out in collaboration with Nokia Research Center, Lausanne. Our objective in this project was to advance the state of the art in observing and controlling the usage of sensitive data in IT systems. We developed methods that monitor the use of data and ensure that usage is conform to the intended purposes for which the data was collected. Furthermore, based on these monitors, we designed and prototypically implemented architectures for pervasive computing applications that report on the misuse of sensitive data.

Involved people

  • David Basin
  • Matus Harvan
  • Felix Klaedtke
  • Eugen Zalinescu

Publications

  • David Basin, Felix Klaedtke, Matus Harvan, Eugen Zalinescu. MONPOLY: Monitoring Usage-control Policies.
    In the Proceedings of the 2nd International Conference on Runtime Verification (RV'11).
    Volume 7186 of Lecture Notes in Computer Science, pages 360--364, Springer-Verlag, 2012.
    Best Tool Paper Award.
  • David Basin, Felix Klaedtke, Eugen Zalinescu. Algorithms for Monitoring Real-time Properties.
    In the Proceedings of the 2nd International Conference on Runtime Verification (RV'11).
    Volume 7186 of Lecture Notes in Computer Science, pages 260--275, Springer-Verlag, 2012.
  • David Basin, Felix Klaedtke, Matus Harvan, Eugen Zalinescu. Monitoring Usage-control Policies in Distributed Systems.
    In the Proceedings of the 18th International Symposium on Temporal Representation and Reasoning (TIME 2011).
    Pages 88--95, IEEE Computer Society, 2011.
  • David Basin, Felix Klaedtke, Samuel Müller. Policy Monitoring in First-Order Temporal Logic.
    In the Proceedings of the 22nd International Conference on Computer Aided Verification (CAV'10).
    Volume 6174 of Lecture Notes in Computer Science, pages 1--18, Springer-Verlag, 2010.
  • David Basin, Felix Klaedtke, Samuel Müller. Monitoring Security Policies with Metric First-order Temporal Logic.
    In the Proceedings of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT'10).
    Pages 23--33, ACM Press, 2010.

Software

MonPoly is a prototype monitoring tool that checks compliance of log files with respect to policies. Policies are specified by formulas in metric first-order temporal logic. The tool was presented at the RV'11 conference and it implements the algorithm presented in the FSTTCS'08 paper Runtime Monitoring of Metric First-order Temporal Properties by David Basin, Felix Klaedtke, Samuel Müller, and Birgit Pfitzmann. MonPoly can be download at https://projects.developer.nokia.com/MonPoly.

Completed related projects

  • external pageManaging Assurance, Security and Trust for Services (MASTER),
    EU FP7 integrated project.
  • Enforcement for Usage Control, with DoCoMo Euro-Labs:
    This project is concerned with understanding and modeling client-side
    enforcement mechanisms for usage control requirements, and with
    developing a server-side architecture that is capable of applying a wide
    range of such mechanisms.
  • Usage Control Requirements in Mobile and Ubiquitous Computing Applications, with DoCoMo Euro-Labs:
    This project is concerned with understanding usage control requirements
    in mobile and ubiquitous computing applications. Requirements elicitation
    is done on the grounds of structured interviews and a literature survey.
  • Requirements for Distributed Usage Control, with Siemens (CH):
    This project is concerned with the understanding of general usage control requirements. Requirements elicitation is done on the grounds of structured interviews and a literature survey.
  • Creating a European Identity Management Architecture for eGovernment, EU FP6 integrated project:
    The goal of this project is the development of a conceptual, technological, social, and legal framework for eGovernment applications that enables and supports the exchange of personal data between different member states of the EU.
JavaScript has been disabled in your browser