Access control is used in computer systems to control access to confidential data. In this thesis we develop flexible access control models for users in dynamic collaborative environments, such as hospitals, or consultancy firms.We propose Audit-based Compliance Control (AC 2 ). In AC 2 user actions are not checked immediately (a-priori), like in conventional access control, but users must account for their actions at a later time (a-posteriori), by providing machine-checkable justification proofs to one or more auditors. This allows users to exchange and access confidential data, like health records in a hospital, in an ad hoc manner. A similar design choice was made recently for the Dutch electronic health record infrastructure (AORTA).We also take a more conventional approach by proposing two extensions to Rolebased Access Control (RBAC). These extensions give users more ways of authorizing and deploying RBAC policy changes, thus favoring dynamic collaboration between users. Printed by Wöhrmann Print Service, Zutphen, The Netherlands.Cover layout and photography by Denis Guzzo (http://denis.guzzo.name).The cover shows the façade of one of the buildings of Erasmus MC, the university hospital of the city of Rotterdam. The overlay is a figure from this thesis (see page 15).
FLEXIBLE ACCESS CONTROL FOR DYNAMIC COLLABORATIVE ENVIRONMENTS
SummaryAccess control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confidential data using conventional access control systems, because users act in unpredictable ways.In this thesis we propose a new access control framework, called Auditbased Compliance Control (AC 2 ). In AC 2 user actions are not checked immediately (a-priori), like in conventional access control, but users must account for their actions at a later time (a-posteriori), by providing machinecheckable justification proofs to auditors. The logical proofs are based on policies received from other users, and other logged actions. AC 2 has a rich policy language based on first-order logics, and it features an automated audit procedure. AC 2 allows users to exchange and access confidential data in an ad hoc manner, and thus collaborate more easily. Applied in a medical setting, for example, doctors would be able to continue their work, regardless of authorization issues such as missing patient consent, and missing or outdated policies. Doctors can deal with these issues at a later time. Although this unconventional approach may seem, at first sight, inappropriate for practical applications, recently a similar design choice has been made for the Dutch national infrastructure for the exchange of electronic health records (AORTA).At the same time we are aware of the fact that it is a big step for organizations to change from a conventional access control mechanism (apriori) to a new mechanism....