4 Fig1DNACAlignmentMethodologytaskstoachievethosegoalsrequiredresourcesandthesecurityandfunctionaldependenciesamongthemTherequirementsmodelisformallyanalyzedagainstanumberofsecuritypropertiestov ID: 248222
Download Pdf The PPT/PDF document "2veniences[65].Forinstance,theemployeeso..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
2veniences[65].Forinstance,theemployeesofacompanycangivetheircredentialstoconsultantsinordertoallowthemaccesstospecicapplications.Thisbehaviorisclearlyagainsttheaccesscontrolpolicyandevenincreasestherisksofsecuritybreaches,sincethesharingofcredentialsdoesnotmakeitpossibletotracetheaccesstotheuserswhoactuallyaccessedacertainapplication.Moreover,thisbehaviorcanleadtoseveralothersecurityproblems,suchasroleusurpation.Thus,theaspirationtomakethesystemmoresecureactuallymakesthesystemmoreinsecure.AsstatedbySinclairandSmith[70],securitytendstoignoresuch\real-worldsubtleties".Real-worldsubtletiesencompasssocialdimensionsofsocio-technicalsystems,suchastheusability[5]andconviviality[40]ofthesystem.Thesehumanfactorsshouldbetakenintoaccountfromtheearlyphasesofthedevelopmentofsocio-technicalsys-tems.Severallinesofresearch(e.g.,[2,11,32,33,38,61])haveexploredtheproblemofdesigningsocio-technicalsystemsaimingtoachievetrade-osbetweenusabilityandsecurity.However,thereareothersocialdimensionsofsocio-technicalsystemswhichmaycon ictwithsecurity.Inthispaper,westudythetrade-obetweensecurityandconviviality.ConvivialityisaconceptfromthesocialsciencesdenedbyIllichas\in-dividualfreedomrealizedinpersonalinterdependence"[40].Clearly,atensionexistsbetweenconvivialityandsecurity:toomuchsecuritythreatensconviviality,whilebeingconvivialisapotentialthreattocondentialityandprivacy.Suchtrade-o/potentialcon ictsshouldbeidentiedandmanagedassoonaspossible,atrequirementlevelandearlydesignstages.Producingasecuritypolicymodelthatisnon-con ictualwithconvivialityexpectationsisdesirable,sinceitencouragesactorstorespectthesecuritypolicybeingused.Theseinitialconsiderationsraisethemainresearchquestionaddressedinthispa-per:Howtomanagethetwodierentorthogonalconcernsofsecurityandconvivialityintheelaborationofsystemoperationalrequirementsanddesignmodels?Themaincontributionofthepaperisin(1)bridgingthegapbetweentwoconceptsthatarerarelybroughttogether,i.e.,securityandconviviality,whichareoftenconsid-eredoppositedomainsofSocialSciencesandInformatics,bydeningasocio-technicalmappingthatbridgesthegapbetweenconvivialityandaccesscontrol;(2)handlingaccesscontrolpolicyupdateonthebasisofconvivialityrecommendations.Thepaperstudieshowtoenableasymbioticelaborationofasecuritypolicyto-getherwithaconvivialitymodel,sothatthepotentialcon ictsbetweenthesetwoviewpointscanbedetectedandsolved.Startingfrominitialoperationalrequirements,theapproachmakesthetrade-oexplicit,andresultsinarepresentationofconvivial-ityconsistentwiththesecuritypolicy(thatcanbeupdatedduringtheprocess).Theapproachdoesnotintendtoweaveorcomposetheseviewpoints[58,56];rather,itpro-ducestwoconsistentmodels,oneforsecurityandoneforconviviality.Ontheonehand,thesecuritymodel,inthehandofsecurityocers,describesthesecuritypolicytobeenforced;ontheotherhand,theconvivialitymodel,inthehandofbusinessexperts,isaformaltoolforreasoningandimprovingthissocialdimensionofasystem.Torecombinethesetwoviewpoints,weproposetheDN-ACalignmentmethodologywhichallowsthespecicationofaccesscontrolpoliciescompatiblewithaconviviality-drivenspecicationofasystem.Increasingconvivialitywhilekeepingasystemsecureraisesthequestionofhowtoadaptanaccesscontrolpolicywhileincreasingtheconvivi-alityofthesystem.Thus,ourmainresearchquestionbreaksdownintothefollowingsubquestions:1.Howtomodelaccesscontrolpoliciestomakeexplicititsadaptableparts? 4 Fig.1DN-ACAlignmentMethodologytaskstoachievethosegoals,requiredresources,andthesecurityandfunctionaldepen-denciesamongthem.Therequirementsmodelisformallyanalyzedagainstanumberofsecuritypropertiestoverifywhetherrequirementshavebeenspeciedcorrectly.Ifthemodelsatisestheseproperties,itisusedtodeterminetheauthorizationruleswhicharenecessarytoprotectthesystem(leftsideofFigure1)andtoanalyzetheconvivialityofthesystem(rightsideofFigure1).Anaccesscontrolpolicyisasetofauthorizationrulesthatspecifytheconditionsunderwhichusersareauthorized/deniedtoaccesstheprotecteddataorresources.Positiveauthorizationrulesrefertopermissionstoaccessresources,whilenegativeau-thorizationrulesrefertoprohibitionstoaccessresources.Inthispaper,wedistinguishbetweennegotiableandnon-negotiableauthorizationrules.Non-negotiableauthoriza-tionrulescorrespondtohardrequirements,i.e.requirementsthatmustbefullledtoguaranteethesecurityofthesystemand,therefore,theycannotbemodied;ontheotherhand,negotiableauthorizationrulescorrespondtotheadaptablepartoftheaccesscontrolpolicyandcanbemodied,forinstance,toincreasetheconvivialityofthesystem.Forthespecicationoftheaccesscontrolpolicy,weuseamodel-drivenapproachbasedon[51].Inparticular,theaccesscontrolpolicyisderivedbyanalyzingthedutiesandresponsibilitiesassignedtostakeholdersandsystemactors.Inparallelandindependentlyfromthespecicationofaccesscontrolpolicy,de-pendencenetworksarecreatedfromtherequirementsmodelandusedtoreasonaboutthepotentialameliorationstoincreasetheglobalconvivialityofthesystem.Dier-enttechniquesforimprovingconvivialityhavebeenproposedintheliterature[9,15],forexamplebychangingtheagentswithinthesystem,bychangingthedependenciesamongthem,byintroducingorchangingnormativedependencies,andbychangingthecompositionofthecoalitions.Inthispaper,weincreasethenumberofcoalitionsbetweenagentsbyadding/removingdependenciesbetweenagents.Theanalysisofthedependencenetworkmaysuggestsomepotentialdependen-ciesbetweenagentstoincreasetheconvivialityofthesystem.Furthermore,feedbackgatheredfromusers,forexamplethroughcommentsordirectinput,maybeusedasadditionalinformationtorepresentusersdependenciesamongeachotherinthedepen-dencenetworks.Suchdependenciesmayalsoimpactresourcesharingbetweenagents,andthustheauthorizationrulesshouldbeupdatedaccordingly. 5 ID ScenarioTitle ScenarioDescription 1 Heart-attack1 HCSmonitorsapatientpronetoheartfailuresandprovideherwithsocialsupport 2 Loneliness HCSarrangesabirthdaypartyforalonelyseniorcitizen 3 Isolation Sendingreminderstofamilymemberstocalltheirelderlyrelativesduringoccasions 4 Finances Financialsupportfromthefamilyandlegalsupportfromanex-pert,arrangedbyHCS 5 Fever Apatientwithfeverdoesnotfeelhelpless,aftertalkingtohisdoctorandreceivingtherightmedication 6 Medication HCSmonitorspatienttotakehermedication,andtakeactionifshedoesnot 7 Weight Signicantweightgain,recognizedandsolvedbyHCS 8 Depression1 Depression,expressedthroughinactivity,issurpassedwiththehelpofWAS 9 Alzheimer AlzheimerpatientndshiswayhomethankstohisGPS/videocapture/HCS 10 Depression2 HCSrecordsloweractivitylevelandcontactsaneighbortovisitseniorcitizen 11 Alcoholism AlcoholismpreventedbytheHCSwiththehelpofthecommunity 12 Heart-attack2 HCScapturespatient'sheartattackdangerandinferstocontactfamilyforhelp Table1UseCaseScenariosThenalstepoftheprocessaimstoreconcilethesecurityandconvivialityview-pointsinordertogenerate\secureandconvivial"system.Thisstepinvolvesasocio-technicalmappingbetweentheaccesscontrolpolicyandthedependencenetwork(re-ferredtoasDN-ACmappinginFigure1).Themappingrelateseachgoalofthede-pendencenetworktothecorrespondingauthorizationrules.Iftheauthorizationrulesarenegotiable,theymaybechangedinordertoincreasethesystemconviviality;oth-erwise,iftheauthorizationrulesarenon-negotiable,thecorrespondingameliorationsarediscarded.Indeed,therevisedpolicyshouldnotviolatethesecurityrequirementsofthesystem.3UseCaseScenarioWehaveconsidered12usecasescenariosthathavebeenelaboratedandvalidatedtogetherwiththeHotCityAmbientAssistantLiving(AAL)ofLuxembourg.Thesce-nariosillustratehowaHomeCareSystem(HCS)couldimproveitsusers'qualityoflifeinavarietyofcasesandcoverdierentareasandproblemsrelatedtoAALlikehealthproblems(Heart-attack,Fever,Medication,Alzheimer),psychologicalorsocialproblems(Loneliness,Isolation,Depression,Alcoholism)andeconomicalproblems(Fi-nances).Acompletedescriptionandanalysisofthesescenarioscanbefoundin[71]wherethescenariosarerepresentedgraphicallyusingdependencenetworks(DN).Theaccesscontrolpoliciesthatcouldbeappliedtothesescenariostoguaranteethesecurityofthesystemarealsogivenin[71].ThesescenariosaresummarizedinTable1.Inthispaper,wehaveselectedthescenarioentitled`Heart-attack1'fromtheusecases(Table1)asourrunningexample:Ms.AnnetteBeckeriseighty-veyearsold.Sheispronetoheartfailures;hencethehospitalhasinstalledasmartHomeCareSystem(HCS)atherhouse.Suddenly,asshewalksoutofthekitchen,shestumbles,fallsdownandcannotgetup.Inrealtime, 7 Fig.2SI*ModeloftheHotCityAmbientAssistantLiving(AAL)scenariothisissue,wemodelexplicitnegativeauthorizationsasin[37].Anegativeauthorizationexpressesadenialforanactortoachieveagoaloraccessaresource.Asforpositiveauthorizations,wedistinguishthreetypesofdenial.Theirmeaningisdualtotheoneofpositiveauthorizations(thehierarchyoftypesofpermissionisalsoreversed).Denialofaccess/modify/manageisgraphicallyrepresentedbyanedgewithlabelDla,DlmdandDlma,respectively.Inourapproach,negativeauthorizationstakeprecedenceoverpositiveones,i.e.wheneverauserhasbothapositiveandanegativeauthorizationonthesamegoal/resource,theuserispreventedtoaccessit.Moreover,anactorcandenypermissiontoanotheractoronlyifhehasmanagepermission.Figure2presentstheSI*modelcorrespondingtotheAALscenariopresentedinSection3.Thescenarioinvolvesveactors:Patient,Hospital,HCS,Neighbor,andSocialSupport.ThePatienthastheintention(objective)tofulllgoalstayhealthyandisthelegitimateownerofherdata,whiletheHospitalhasthecapabilitytoachievegoalupdatepatientrecord.Goalscanproduceorconsumeresources.Forinstance,goalmaintainpatientrecordrequiresresourcepatientprole.ThePatientreliesontheHCStofulllgoalstayhealthy.Inturn,thisgoalisdecomposedintoupdatepatientprole,determineemergencylevel,andprovidemedicalsupport.Inordertoachievethesegoals, 9 PositiveAuthorizations 1 hPatient;manage;patientdata;permiti 2 hHospital;manage;patientprofile;permiti 3 hHospital;manage;patientdata;permiti 4 hHCS;manage;phonecommunicationsystem;permiti 5 hHCS;access;patientdata;permiti 6 hHCS;access;patientprofile;permiti 7 hSocialSupport;manage;socialsupportresources;permiti NegativeAuthorizations 8 hHospital;access;phonecommunicationsystem;denyi 9 hHCS;access;socialsupportresources;denyi 10 hSocialSupport;access;patientdata;denyi 11 hSocialSupport;access;patientprofile;denyi 12 hSocialSupport;access;phonecommunicationsystem;denyi 13 hNeighbor;access;patientdata;denyi 14 hNeighbor;access;patientprofile;denyi 15 hNeighbor;modify;socialsupportresources;denyi Table2NonNegotiableAuthorizationsfortheAALscenarionotspecied(e.g.,noauthorizationonthephonecommunicationsystemaredenedforthepatient).Indeed,unlikelyelicitedrequirementscoverallpossiblecases.Weassumethattheauthorizationdecisionforcaseswhereanauthorizationruleisnotdened,isdeny.Althoughthissolutionguaranteesthatthedeployedaccesscontrolmechanismcomplieswiththeleastprivilegeprinciple,ithasthesideeectthatsuchamechanismmaybetoorestrictive.Toaddressthisissue,wedistinguishbetweennegotiableandnon-negotiableautho-rizationrules.Non-negotiableauthorizationrulesrepresentrigidauthorizationsthatcannotbemodiedtoguaranteethesecurityofthesystem.Essentially,theyarestrictconstraintsimposedbytherequirementsand,therefore,theycannotberelaxed.Ac-cordingly,theauthorizationsinTable2whicharetranslatedfromrequirementsarenon-negotiable.Negotiableauthorizationrules,ontheotherhand,regulatesituationsforwhichaconstraintisnotexplicitlydenedbytherequirements.Theserulesarederivedfromconvivialityrecommendations(Section7).Intuitively,thedistinctionbe-tweennon-negotiableandnegotiableauthorizationrulesresemblesthedistinctionbe-tweenhardrequirements(i.e.,compulsoryrequirements)andsoftrequirements(i.e.,optionalrequirements)[41].Byintroducingnegotiableauthorizationrules,weaimtoincreasethe exibilityofthesystembyhighlightingtheadaptablepartoftheauthorizationpolicy,ratherthanintroducingotherdecisionstypes.Inotherwords,unlikeXACML[1]whichextendsbinarydecisionsPermitandDenywithNotApplicabledecisiontoindicatethatnopoliciesareapplicabletoagivenaccessrequest,weassumethatthedefaultaccessdecisionisdenyandprovidethe exibilitynecessarytodealwithrequirementsevolutionthroughnegotiableauthorizations.6ConvivialityModelConvivialityhasrecentlybeenintroducedintomulti-agentandambientintelligencesystems[18,21]tohighlightsoftqualitativerequirementsliketheuserfriendlinessofsystems.Theconceptofconviviality,originatedfromsocialscience,waspopularizedby 116.2DependenceNetworksWenowintroduceourdenitionofdependencenetworks.Notethatinourmodel,thedependenciesareamongtheagents,soifanagentadependsonadistinctagentbforanaction,aresourceoraplantoachieveitsgoalg,thedependencyofagentatowardsagentbwillbeong.Goalsareconsideredthereasonsforwhichthedependenciesarise.Abstractingawayfromtheactions,resourcesandplansoftheagents,wedeneadependencenetworkasfollows:Denition2AdependencenetworkisatuplehA;G;dep;iwhere:Aisasetofagents,Gisasetofgoals,dep:AA!2Gisafunctionthatrelateswitheachpairofagents,thesetsofgoalsonwhichtherstagentdependsonthesecond,and:A!2G2Gisforeachagentatotalpre-orderonsetsofgoalsoccurringinhisdependencies:G1(a)G2.Inourmodel,thedependenciesinthedependencenetworkcorrespondtothedel-egationsofexecutionintheSI*model,whichaccountforgoalrenementassomedelegatedgoalsaresubgoalsofotherdelegatedgoals.Returningtoourscenario,considerthedependencenetworkDN=hA;G;dep;icorrespondingtotheSI*modelintroducedinSection4:{AgentsA=fP;H;HCS;N;Sg,respectively:patient,hospital,HCS,neighbor,andsocialsupport;GoalsG=fg1;g2;g3;g4;g5;g6;g7g:{dep(P;HCS)=fg1g:agentPdependsonagentHCStoachievegoalsfg1g,stayhealthy;dep(HCS;H)=fg2g:agentHCSdependsonagentHtoachievegoalsfg2g,updatepatientprole;dep(H;HCS)=fg3g:agentHdependsonagentHCStoachievegoalsfg3g,getreal-timedata;dep(HCS;N)=fg4g:agentHCSdependsonagentNtoachievegoalsfg4g,providerstaid;dep(P;S)=fg5g:agentPdependsonagentStoachieveitsgoalsfg5g,providesocialsupport;dep(S;P)=fg6g:agentSdependsonagentPtoachieveitsgoalsfg6g,getpatientparticipation.{AgentPpreferstostayhealthythantogetsocialsupport:fg5g(P)fg6gThegraphicalrepresentationofthedependencenetworkisillustratedinFigure3.Thegureshouldbereadasfollows:theveagentsarerepresentedbythenodesinthegraph,andthedependenciesamongthemareindicatedbylabeledarrows.Thelabelindicatesthegoalonwhichthedependencyisbased.Forexample,thepatientdependsonitsHomeCareSystemtostayhealthy.Insocio-technicalsystems,agentsareinvolvedwitheachotherandmaysupporteachothers'goalsifanagentisnotabletoachievethembyitself.Dependencenet-worksandcoalitionalgametheoriescanbeusedtodenepotentialreciprocity-basedcoalitions,whicharesetsofagentstogetherwithasubsetofthedependenciesfortheseagents,suchthateachagentcontributessomethingandreceivessomethingfromthecoalition.Basedon[9],wedeneacoalitionasfollows:Denition3LetAbeasetofagentsandGbeasetofgoals.AcoalitionfunctionisapartialfunctionC:A2A2GsuchthatfajC(a;B;G)g=fbjb2B;C(a;B;G)g, 13Ouraimistomaximizecooperationinthesystem.Thus,ourrequirementsare:R1maximizethesizeoftheagent'scoalitionsbyincreasingthenumberofagentsinvolvedinthecoalitions,R2maximizethenumberofthesecoalitions.Intuitively,thegoalishencenotonlytohaveasmanyagentstakingpartinthelargestcoalition(s),butalsohaveasmanycoalitionsamongtheparticipatingagents.Dependencecyclesinthenetworkindicatepotentialinteractionsandcoalitionsamongtheagents.Thus,weanalyzecyclesandtheircongurationsinthenetwork.ThedependencenetworkinFigure3containstwocycleswhichareindicativeoftwopotentialcoalitions,ontheonehandamongagentsHCSandH,andontheotherhandamongagentsPandS.Weindicatethetwopotentialcoalitionsasfollows:C1:f(H;HCS;g3);(HCS;H;g2)gandC2:f(P;S;g5);(S;P;g6)g,wherewewrite(a;b;g1)for(a;b;fg1g).NotethatagentNdoesnotdependonanyotheragent,whereasagentHCSdependsonagentNforgoalg4.Hence,agentNhasnoincentivetosatisfyagentHCS'sgoal,asitdoesnothaveanygoaltoreciprocate.Thisindicatesthattheremaybewaystoincreasetheconvivialityofthenetwork,forexamplebyincludingintoacoalitionagents,suchasagentN,whicharenotpartofthecoalition.6.3ConvivialityIncreaseAccordingtoBoellaetal.[9],coalitionsinadependencenetworkmaybechangedinthefollowingways:1)bychangingtheagents,e.g.,byenteringorleavingthesystem,2)bychangingthedependenciesamongtheagents,i.e.,byaddingordeletingdependenciesamongtheagents,3)byintroducingorchangingnormativedependencies,suchasobligationsandprohibitions,and4)bychangingthecompositionofthecoalitionswhiletheagentsanddependenciesremainthesame.Inthispaper,weassumethatthesetofagentswithinthedependencenetworkisgivenanditdoesnotchangeovertime.Similarly,wedonotconsiderchangesinthecompositionofthecoalitionswithinthenetworkduetointernalprocesses.Finally,wedonotintroducenormativedependenciesas,typically,policiesareconsideredasrulesandconstraintsthatmodelintendedbehaviors.Infact,theycontrastwithnormsconsideredasagreedpoliciesinthesensethattheyareagreedtobythemembersofacommunity.Convivialityforexample,isusuallyconsideredasasocialnorm.Normsapplytogroupsandregulatethebehavioroftheindividualsamongthemselves;theydierfrompolicies,suchasaccesscontrolpolicies,whichmayalsoapplytosingleindividuals.Forexample,privacypoliciesmayapplytoanindividualpatient,andmaillteringpoliciestoasingledoctor.Thus,amongtheapproachesmentionedin[9],weadoptthesecondapproach;accordingly,achangeinthenetworkisonlyduetothechangeofadependencybetweentwoagents.Werecallfromtheprevioussection,thetworequirementsforconviviality,i.e.,tomaximizethenumberofagentsinvolvedincoalitions(R1)andthenumberofcoalitions(R2).SatisfyingR1andR2willmaximizeconviviality.Considerthataneedforsocialinteractionsmaybeinferredfortheneighbor,ordirectlyexpressedbytheneighborthroughafeedbackloop.Suchanaspirationcouldbefullledbasedondistinctdependencies,i.e,agentN(i.e.,theneighbor)maydependonagentP(i.e.,thepatient),oronagentS(i.e.,SocialSupport)toachieveit.Asthe 15 Fig.4DynamicDependenceNetworkDDNwiththeaddedgoalg7,indashedlinerstlydenedbyEmerson[31],havebeendevelopedinthecontextofmulti-agentsys-temsbyConteandSichman[68].Sichman[67]presentscoalitionformationusingadependence-basedapproachwhereadependencesituationallowsanagenttoevaluatethesusceptibilityofotheragentstoadopthisgoals.Sauro[62,63]showshowtousedependencenetworkstodiscriminateamongdierentpotentialcoalitionsduringthecoalitionformationprocess.Heassumesthatacoalitioniseectivelyformedonlywhenallitsmembersagreeonitandtheycannotdeviatefromwhatwasestablishedintheagreement,oncetheydecidetoenterit.Bonzonetal.[10]usedependencenetworkstocomputepure-strategyNashequilibriuminasimplerway,withoutenumeratingallcombinationsofstrategies.Thenotionofdependencebetweenplayersandvariablesisusedtosplitupagameintoasetofinteractingsmallergames,whichcanbesolvedmoreorlessindependently.InSauroandVillata[64],abstractandreneddependencenetworksforcooperativebooleangamesareintroducedtoimprovethecomputationofthecore.KollerandMilch[43]introducearepresentationlanguageformulti-playergamescalledmulti-agentin uencediagrams.Itextendsthegraphicalmodelsdevelopedforprobabilitydistributionstoamulti-agentdecision-makingcontext.Likeindepen-dencenetworks,thesediagramsexplicitlyencodeastructureinvolvingthedependencyrelationshipsamongvariables.Manyexamplesofusingdependencenetworkscanbefoundinsoftwareengineer-ing.Forinstance,thei*modelinglanguage[73]andtheTropossoftwareengineeringmethodology[12]representthenetworkofdependencyrelationshipsamongtheactorstoanalyzetheorganizationalsettinginwhichthesystem-to-beoperates.Inparticular,theirnotationallowsthedescriptionofthestructuralaspectsoftheearlyrequirementsmodel,intermsofrelationshipsanddependenciesamongactors.Theseframeworkshavebeenextendedtodescribealsohowthenetworkofdependenciesevolvesovertimeandthecircumstancesunderwhichagivendependencyarisesandcanbespec-ied,aswellastheconditionsthatpermittoconsiderthedependencetobefullled[35,52].Oneofthemainadvantagesofdependencenetworksisthattheycanberewrittenaspowerstructures:a(social)dependencyofagentdonagentpforreasonecanbeconceptualizedasthe(social)powerofagentpoveragentdforthereasone.Moreover,thedistinctionbetweenreciprocalandmutualdependencies[69]involvesthedevel-opmentofasocialreasoningmechanismthatanalyzesthepossibilitiestodierentlyprotfromreciprocalthanfrommutualdependencies. 17 Fig.5DependenceNetworkandAccessControlOntologiesontology.Therefore,adaptinganaccesscontrolpolicyonthebasisofdependencyrela-tionsbetweenagentsrequiresclosingthesemanticgapbetweenthesetwoontologies.Intheremainderofthesection,wediscusshowtocreateamappingbetweendependencenetworkconceptsandaccesscontrolconceptstonarrowthesemanticgapbetweenthetwoparadigms.7.2MappingBetweenAccessControlPolicyandDependenceNetworksPotentialdependenciesarebuiltupontheachievementofaspecicgoalbetweenadependerandadependee.Tobeabletoanalyzetheimpactofsuchdependenciesontheexistingaccesscontrolpolicy,itisnecessarytodeterminewhichauthorizationrulesanagentneedsinordertocarryouttheassignedduties(i.e.,tofulllthedelegatedgoal).Tobridgethegapbetweendependencenetworksandaccesscontrol,weproposetomapeachgoalinthedependencenetworktothesetofactionsandresourcesthatarerequiredtofulllthegoal.Thismappingisillustratedbyasocio-technicalmappingmatrixdenedasfollows.Denition5Asocio-technicalmappingmatrixisanmmatrixwhererowsdenotepairs(resource;action),andcolumnsdenotegoals.Thesocio-technicalmappingmatrixshows,foreachgoalinthedependencenetwork,whichresourcesareneededfortheachievementofthegoaltogetherwiththeactions(i.e.,access,modifyandmanage)thatcanbeperformedonsuchresources.ThelinkbetweenresourceandgoalsisderivedfromtheSI*modelthroughAND/ORrene-mentanddelegationsofexecution(Section2)usingtheapproachpresentedin[51].Intuitively,ifaresourceislinkedtothegoal(viaameans-endrelation),thenthere-sourceisneededfortheachievementofthegoal.Ifagoalisdecomposedintosubgoals,eachsubgoalisiterativelyanalyzed.Inparticular,resourceslinkedtoasubgoalare 18 (Resources,Actions)/Goals StayHealthy UpdatePatientProle GetReal-TimeData Providerstaid ProvideSocialSupport GetPatientParticipation GetSocialInteraction Patientdata Access + + + + NA NA NA Modify NA NA NA NA NA NA NA Manage NA NA NA NA NA NA NA Patient Access + + NA NA NA NA NA prole Modify + + NA NA NA NA NA Manage NA NA NA NA NA NA NA Phone Access + NA NA NA NA NA NA communication Modify NA NA NA NA NA NA NA system Manage NA NA NA NA NA NA NA Social Access NA NA NA NA + + + support Modify NA NA NA NA + + NA resources Manage NA NA NA NA NA NA NA Table3Socio-technicalmappingmatrixneededfortheachievementoftheupperlevelgoals.3Ifa(sub)goalisdelegatedtoanotheractors,thecorrespondinggoalmodelrootedintherationaleofthedelegatorisanalyzedasdescribedabove.Thus,thesetofresourcesneededtoachieveagoalin-cludesallresourcesneededfortheachievementofitssubgoalspossiblyviadelegation.Theactionstobeperformedontheseresources(i.e.,access,modify,manage)arede-rivedbytheanalysisofthegoalsforwhichtheresourceisdirectlylinked.Forinstance,goalmaintainpatientproleinFigure2(andthusgoalupdatepatientprole)requires`modify'rightsonthepatientprole.Goalelicitedthroughthedependencenetworktoincreasetheconvivialityofthesystem(e.g.,getsocialinteractioninourscenario)areanalyzedinsimilarway.Forinstance,theanalysisofgoalgetsocialinteractionshowsthatitsachievementrequires`access'rightsforsocialsupportresources.Inthiswork,werelyonthetoolpresentedin[48],whichimplementstheapproachin[51],toautomaticallyinferthelistofresourcesneededtoachieveagoal.Table3presentsthesocio-technicalmappingmatrixforourscenario.Intheta-ble,\+"isusedtorepresentthatexecutingacertainactiononacertainresourceisnecessarytoachievethegoal,andNA(i.e.,notapplicable)torepresentthatacertainresource(oranaction)isnotneededfortheachievementofthegoal.Theanalysisofthedependencenetworkmayleadtoconsiderpotentialdependen-ciesbetweenagentstoimprovetheconvivialityofthesystem.However,theimpactofsuchdependenciesonthesystemsecurityshouldbeanalyzed.Indeed,dependenciescannotbedeployedinthesystemiftheyleadtosecuritybreaches.Toassesstheimpactofapotentialdependencyontheaccesscontrolpolicy,weidentifywhichauthorizationrulesareneededtoachievethedelegatedgoalusingthesocio-technicalmappingmatrix.Werefertothoseauthorizationsascandidateauthorizationrules,denotedbyca.Givenapotentialdependencydep(a;b;s)whereaisthedepender,bthedependee,andsistheagentcreatingthedependency,thecorrespondingsetofcandidateauthorizationrulesca(dep(a;b;s))isidentiedasfollows:{Foreachgsuchthatfg2GjG=dep(a;b;s)g,thepairs(resource;action)neededforachievementofgaredeterminedthroughthesocio-technicalmappingmatrix.{Eachidentiedpair(resource;action)isaugmentedwiththedependeeb.Theresultingsetformsthesetofcandidateauthorizationrules. 3NotethatORdecompositionmayleadtoalternativesetsofresourcesthatmaybeneededtoachieveagoal.Forthesakeofsimplicity,wedonotaddressthisissuehereandreferto[51]fordetail. 20levelofsecurity.Thissectionrstdescribestwovalidationscenariosandtheprototypeimplementationoftherunningexample.Thesedescriptionsarefollowedbyapresen-tationoftheresultsinSection8.3andbyadiscussiononthethreatstovalidityinSection8.4.8.1ValidationScenariosThemethodologypresentedinthispaperhasbeenappliedtoaselectionoftwelvescenarios.Thereadermayrefertoatechnicalreport[71]formoredetailsconcerningthedierentscenariosbesidestheauthorizationrulesandthedependencenetworksrelatedtoeachscenario.ThisselectionwasdonebytheHotCityexpertsbasedonthefollowingtwocriteria:1)likelihood,i.e.,theprobabilitythatthescenariooccursand2)impact,i.e.,theconsequenceonhumanlifeofthefailureofthescenario.Here,wejustdetailtwoofthem,andpresenttheresultsoftheothersinSection8.3.Thetwoselectedscenariosillustratehowthesystemisadaptedgivenanewdepen-dency.Eachscenariohasbeenmodeledwithadependencenetwork.Later,weconsiderthemodelstoinferthepotentialgoalsanddependenciesthatmaybeaddedtoincreasethenumberofcyclesinthenetwork,i.e.,conviviality.Foreachpotentialdependency,weusedsocio-technicalmappingmatricestoinferthechangestotheauthorizationpoliciesgoverningthescenarios.8.1.1Scenario1:HeartAttack1Thisscenario,whichistherunningexample,hasbeenpresentedinthedependencenet-workofFigure3.Inthisscenario,theneighborisisolatedanddoesnotdependonanyanotheragentinthesystem.Theneighbormayhaveapotentialdependencywiththepatient,AnnetteBecker,togetasocialinteractionlikepresentedinFigure3.Suchade-pendencyismappedtoauthorizationrulehPatient;access;socialsupportresources;permitithroughthesocio-technicalmappingmatrixinTable3.Indeed,thefulllmentofgoalgetsocialinteractionrequiresaccesstosocialsupportresources.Sincetherearenohardrequirementscon ictingwiththisauthorizationrule,theruleisaddedtotheauthorizationpolicyasnegotiablerule(seeCase1intheprevioussection).Thus,theconvivialityofthesystemisincreased,whilethesystemstillcomplieswiththeelicitedsecurityrequirements.8.1.2Scenario2:Depression1Inthisscenario,Donaldisa32yearsoldsalesmanwholivesaloneandhasnosocialactivitybesideshisjob.ThescenarioisillustratedbythedependencenetworkofFig-ure6.DonalddependsontheWelfareAssistanceSystem(WAS)ofthelocalhospitalforgoalpreventdepression.Inturn,theWASdependsonDonaldtohavehispreferencesconcerningsocialactivitiesheenjoysandhisavailability.Inaddition,otherpatients,namelyNorman,StanandBob,dependontheWASfororganizingsocialactivities.TheWASusesaschedulingsystemtoorganizesocialactivitiesforpatients.Thepolicythatregulatesthescenarioincludesanumberofnon-negotiableautho-rizationrulesregulatingtheaccesstotheschedulingsystemandpatients'preferences:R1:hWAS;manage;schedulingsystem;permiti 22 Fig.6DependenceNetworkofScenario2:Depression1 Fig.7ScenarioSequenceDiagramafallalongwiththedatacollectedbythewatchsuchastemperatureandpulserate.Thefallisconsideredanemergencycase;howseriousthiscaseismustbeevaluatedbytheHC.Tothisend,thealertautomaticallytriggerstheexecutionoftheWMcomponent.Therststepistoconrmthefallusinganothersourceofinformation.TheVideoRecordercomponentcollectsandprocessesimagescapturedbyvideocamerasinthehouse.Oncesuchinformationhasbeengathered,theHCcanconrmthefall,andresumestheexecutionofthework ow.TheHCneedstocollecthealthinformationaboutthepatientinordertodecidewhetherthesituationisalow,amediumorahighlevelemergency.Patients'healthinformationisrequestedbythePHRtotheElectronicEmergencyResponderofthelocalhospital.Thedatacollectedaretheclinicalsummary(DR02)anddecisionsupportdata(DR17)asdescribedin[39].Bycompilingalltheinformationcollected,theHCmakesthedecisionaboutthelevelofemergency.Incaseofamediumemergency,theHChastondsomeonewhocanprovideassistancetothepatient.Tothisend,thework owactivatestheECLcomponent.The 24ourapproachin91.6%oftheselectedscenarios,withsometimesmajorimprovements(offactor3).Consequently,itappearsthatbyjustcombiningthesocialdimension,i.e.,conviviality,andaccesscontrolpolicymaybringimprovementsregardinghowusersperceivethesystem.Thismeansthatconvivialitymaybeeortlesslyimprovedwithoutdegradingthesecurityofthesystem.Indeed,wehaveonlyconsideredchangesthatdonotaectnon-negotiableauthorizationrules.Theadded-valueofourapproachistomakeexplicitdecisionsthatwerepreviouslytakeninanad-hocmannerbyconsideringsocialandsecurityaspectswhilereconsideringthesystemdesign.8.4ThreatstovalidityDuringthiswork,wehavehaveidentiedpotentialthreatstothevalidityofthepro-posedapproachanditsvalidation.Thissectionlistssomeofthosethreats.Asathreattointernalvalidity,wecanassumethatthemethodologyweproposerequiresanexperttomanuallycheckforconvivialityimprovement.Weneedtogobeyondamethodologydenitionandndasystematicapproachtoallowautomatedselfimprovementofthesystem'sconvivialitywhilekeepinginmindthesecuritypolicy.Thethreatstoexternalvalidityarerelatedtotheleveltowhichourscenariosarerepresentativeofreallifecasestudies.Thescenariosthatwehaveconsideredtovalidatetheapproachwerequitesimpleintermsofnumberofactorsorgoals.Inthefuture,weintendtoimprovethevalidationprocessusingmoreelaboratedscenarioswithmoregoals,andmoreactors,toshowtheeectivenessofourapproachtoachievescalability.9RelatedWorkThisworkspansfourmainresearchareas,namelyassistanceinpolicyspecication,pol-icyadaptation,requirementsnegotiationandconviviality.Inthedomainofassistanceinpolicyspecication,somecontributionshavebeenproposedtollthegapbetweenrequirementsanalysisandpolicesspecication.Basinetal.[4]presentaUML-basedmodelinglanguage,calledSecureUML,formodelingaccesscontrolpoliciesandinte-gratingthese(policies)intoamodel-drivensoftwaredevelopmentprocess.Dardenneetal.[28]proposeaprocessforreningrequirementsandderivesecuritypoliciesfromthem.Inparticular,therenementprocessallowsthederivationofaccesscontrolpoli-ciesandobligationsexpressedinPonder[27].AnotherworkinthesamedirectionhasbeenpresentedbyCrooketal.[25]whoproposeaframeworkfordeningaccesscontrolpolicieswhichconsiderstheassignmentofuserstotheroleswithinanorgani-zation.Theseproposals,however,focusonthesystem-to-be,anddonotanalyzetheorganizationalenvironmentinwhichthesystemwilleventuallyoperate.Inparticular,theydonotconsiderthesocialrelationsbetweenstakeholderswhicharethebasisforspecifyingconviviality-drivenaccesscontrolpolicies.Massaccietal.[46,47]presentaquantitativeapproachtodeterminetheaccesscontrolpolicyforaninter-organizationalbusinessprocess,whichisminimalwithrespecttothesensitivityofdataandtheleveloftrustbetweenactors.Thisapproachallowsuserstoexpresstheirpreferencesintheformofprivacypenaltiesassociatedtopersonaldataandtothepartnerofthebusinessprocess.Then,itdeterminesthealternativewiththesmallestprivacypenaltyandthusguaranteesmaximalprivacyprotection.Incontrast,ourworkmainlyfocusesonthetrade-obetweenconvivialityandsecurity,wherethenumberandsizeofcoalitionsis 26toderiveanaccesscontrolpolicyfromtherequirementsmodel.Bryletal.[13]proposearequirementsanalysisapproachforsocio-technicalsystemswhichemploysplanningtechniquesforexploringthespaceofrequirementsalternativesandanumberofsocialcriteriafortheirevaluation.ThisapproachhasalsobeenappliedtoSI*toselecttheoptimalsecuritydesignamongasetofalternatives[14].Theplanobtainedusingtheapproachin[13,14]areoptimalwithrespecttothelengthoftheplan,whereoptimalityisdenedintermsoflengthminimization.Thisapproach,however,isnotapplicabletoconvivialitysincetheplanwithminimallengthisusuallynottheonethatmaximizesconviviality.Bryletal.[13]alsoproposemetricstostudythecriticalityofanactorinaplan.Ourapproachwouldbenetfromtheapplicationofsuchmetricstodependencenetworksastheyprovideinsightsontheresilienceofdependencenetworks.Convivialityhasbeenintroducedasasocialconceptinmulti-agentsystemsthatre ectsrelationsbetweenindividualstoemphasizesomehumanaspectslikeequalityandcommunitylife[22].Inpreviousstudies(e.g.,[16])convivialityismeasuredintermsofinterdependenciesbetweenagents.Thebasisideaisthatmoreopportunitiestoworkwithotherpeopleincreasestheconviviality,whereaslargercoalitionsmayde-creasetheeciencyandstabilityofthesecoalitions.Ourworkconsidersconvivialityfromadierentperspective:convivialitycanbeincreasedaslongasitdoesnotimpactthesystemsecurity.Convivialityhasbeencapturedthroughthreemodelsusingde-pendencenetworks[19]:therstmodelcapturestemporalpropertiestoreasonaboutconvivialityevolutionovertime;thesecondmodelcapturesstakeholdersviewpoints;andthethirdmodelcapturestransformationsofsocialdependenciesbyhidingpowerrelationsandsocialstructurestofacilitatesocialinteractions.Inourwork,wedonotconsiderthetemporaldimensionthatmayregulateagents'dependencies;thisaspectwillbeinvestigatedinfuturework.10ConclusionsandFutureWorkChangesinsocio-technicalrequirements,design,andenvironmentmayrequiretoadaptandupdatetheaccesscontrolpolicyregulatingthesystem.ThispaperpresentstheDN-ACalignmentmethodologyforanalyzingaccesscontrolpolicieswithrespecttotheconceptofconviviality.Wehaveusedagoal-orientedmethodologytocaptureandanalyzethesocialinteractionsbetweenstakeholders.Then,securityinteractionsareusedtodenetheaccesscontrolpolicy,whereasdependenciesareusedtoanalyze,throughdependencenetworks,theconvivialityofthesystem.Toreconcilethesecurityandconvivialityvisions,weproposedasocio-technicalmappingmatrixthatconnectsconceptsofaccesscontrolandconceptsrelatedtodependencenetworkstoanalyzetheimpactofconvivialityonexistingauthorizationrules.Wealsodenedhowtoadaptauthorizationrulesbasedontheimpactofconvivialityonthesystemsecurity.Tovalidatetheproposedmethodology,wehavebuiltaproof-of-conceptprototypefromtheAALusecaseofLuxembourgHotCity.Themainlessonlearnedfromthescenarioisthattheoutcomeofourmethodologyleadstocreatemorecoalitionsbetweenagentsandthustoincreasetheconvivialitywhilemaintainingthesecuritylevelofthesystem.FurtherworksinvolvereningtheprocessofautomaticderivationofdependencenetworksandACpolicyfromrequirements.Thiswillenabletosystematicallyanalyzecomplexscenariosinvolvingalargenumberofagentsanddependencies.Moreover,inthispaperweconsiderstaticmodels,whereasinvestigatingtheevolutionofmodelswouldprovidener-grainedanalysisovertheconvivialityimprovementandACpolicy 2820.Caire,P.,vanderTorre,L.:Temporaldependencenetworksforthedesignofconvivialmultiagentsystems.In:Proceedingsofthe8thInternationalJointConferenceonAu-tonomousAgentsandMultiagentSystems,pp.1317{1318.InternationalFoundationforAutonomousAgentsandMultiagentSystems(2009)21.Caire,P.,Villata,S.,Boella,G.,vanderTorre,L.:Convivialitymasksinmultiagentsystems.In:Proceedingsofthe7thInternationalJointConferenceonAutonomousAgentsandMultiagentSystems,pp.1265{1268.InternationalFoundationforAutonomousAgentsandMultiagentSystems(2008)22.Caire,P.,Villata,S.,Boella,G.,vanderTorre,L.:Convivialitymasksinmultiagentsystems.In:Proceedingsofthe7thInternationalJointConferenceonAutonomousAgentsAndMultiagentSystems,pp.1265{1268.InternationalFoundationforAutonomousAgentsandMultiagentSystems(2008)23.Castelfranchi,C.:Themicro-macroconstitutionofpower.Protosociology18,208{269(2003)24.Cormen,T.H.,Leiserson,C.E.,Rivest,R.L.,Stein,C.:IntroductiontoAlgorithms,2ndedn.TheMITPress(2001)25.Crook,R.,Ince,D.,Nuseibeh,B.:Modellingaccesspoliciesusingrolesinrequirementsengineering.InformationandSoftwareTechnology45(14),979{991(2003)26.Damen,S.,Zannone,N.:PrivacyImplicationsofPrivacySettingsandTagginginFace-book.In:Proceedingsofthe10thVLDBWorkshoponSecureDataManagement.Springer(2013)27.Damianou,N.,Dulay,N.,Lupu,E.,Sloman,M.:ThePonderPolicySpecicationLan-guage.In:ProceedingsoftheInternationalWorkshoponPoliciesforDistributedSystemsandNetworks,LNCS1995,pp.18{38.Springer(2001)28.Dardenne,A.,vanLamsweerde,A.,Fickas,S.:Goal-directedrequirementsacquisition.In:Proceedingsofthe6thInternationalWorkshoponSoftwareSpecicationandDesign,pp.3{50.ElsevierSciencePublishersB.V.,Amsterdam,TheNetherlands(1993)29.Elahi,G.,Yu,E.S.K.:Modelingandanalysisofsecuritytrade-os-agoalorientedap-proach.DataKnowl.Eng.68(7),579{598(2009)30.Elahi,G.,Yu,E.S.K.,Zannone,N.:Avulnerability-centricrequirementsengineeringframe-work:analyzingsecurityattacks,countermeasures,andrequirementsbasedonvulnerabil-ities.Requir.Eng.15(1),41{62(2010)31.Emerson,R.:Power-dependencerelations.AmericanSociologicalReview27,31{41(1962)32.Flechais,I.,Mascolo,C.,Sasse,M.A.:Integratingsecurityandusabilityintotherequire-mentsanddesignprocess.Int.J.Electron.Secur.Digit.Forensic1(1),12{26(2007)33.Flechais,I.,Sasse,M.A.,Hailes,S.M.V.:Bringingsecurityhome:aprocessfordevelop-ingsecureandusablesystems.In:Proceedingsofthe2003WorkshoponNewSecurityParadigms,pp.49{57.ACM(2003)34.Frankl,P.G.,Weyuker,E.J.:Testingsoftwaretodetectandreducerisk.JournalofSystemsandSoftware53(3),275{286(2000)35.Fuxman,A.,Liu,L.,Mylopoulos,J.,Roveri,M.,Traverso,P.:SpecifyingandanalyzingearlyrequirementsinTropos.Requir.Eng.9(2),132{150(2004)36.Giorgini,P.,Massacci,F.,Mylopoulos,J.,Zannone,N.:ModelingSecurityRequirementsThroughOwnership,PermissionandDelegation.In:Proceedingsofthe13thIEEEInter-nationalConferenceonRequirementsEngineering,pp.167{176.IEEEComputerSociety(2005)37.Giorgini,P.,Massacci,F.,Mylopoulos,J.,Zannone,N.:Requirementsengineeringfortrustmanagement:model,methodology,andreasoning.Int.J.Inf.Sec.5(4),257{274(2006)38.Gutmann,P.,Grigg,I.:Securityusability.Security&Privacy,IEEE3(4),56{58(2005)39.HealthcareInformationTechnologyStandardsPanel(HITSP):EmergencyResponderElectronicHealthRecordInteroperabilitySpecication(IS04),Version2.0(2008)40.Illich,I.:ToolsforConviviality.MarionBoyarsPublishers,London(1974)41.Jureta,I.J.,Mylopoulos,J.,Faulkner,S.,Schobbens,P.Y.:Coreontologyforrequirementsengineering.Tech.rep.,InformationManagementResearchUnit,UniversityofNamur(2007)42.Kazman,R.,Klein,M.,Barbacci,M.,Longsta,T.,Lipson,H.,Carriere,J.:Thearchitec-turetradeoanalysismethod.In:Proceedingsofthe4thIEEEInternationalConferenceonEngineeringofComplexComputerSystems,pp.68{78.IEEEComputerSociety(1998)43.Koller,D.,Milch,B.:Multi-agentin uencediagramsforrepresentingandsolvinggames.GamesandEconomicBehavior45(1),181{221(2003) 3069.Sichman,J.S.,Demazeau,Y.:Onsocialreasoninginmulti-agentsystems.RevistaIberoamericanadeInteligenciaArticial13,68{84(2001)70.Sinclair,S.,Smith,S.W.:What'swrongwithaccesscontrolintherealworld?IEEESecurityandPrivacy8,74{77(2010)71.VasileiosEfthymiou,P.C.:DiagramAnalysisReport:UseCasesforConvivialityandPri-vacyinAmbientIntelligentSystems.UniversityofLuxembourg,SnT,Luxembourg(2012)72.Yee,K.P.:Aligningsecurityandusability.Security&Privacy,IEEE2(5),48{55(2004)73.Yu,E.:Modellingstrategicrelationshipsforprocessreengineering.Ph.D.thesis,UniversityofToronto,Canada(1995)