PERMIS – A modular authorisation infrastructure
Submitting Institution
University of KentUnit of Assessment
Computer Science and InformaticsSummary Impact Type
TechnologicalResearch Subject Area(s)
Information and Computing Sciences: Computer Software, Distributed Computing, Information Systems
Summary of the impact
PERMIS is a suite of open source security software, written mostly in
Java, which provides an application-independent, standards-based,
authorisation infrastructure that enables software developers to
incorporate state of the art authorisation functionality into their
systems with a minimum of effort.
PERMIS has been integrated into a wide variety of environments including
grids, clouds and more specialised domains, leading to more secure systems
for end users at a reduced cost of implementation; for example, the Swiss
Ministry of Defence has adapted PERMIS for use in an air force
application. It consistently gets more than 1000 downloads per year, with
over 100 new users registering annually.
Underpinning research
PERMIS was the first implementation of the 2001 ISO/ITU-T X.509 standard
for a privilege management infrastructure (PMI). Chadwick is the UK BSI
representative to ISO/ITU-T X.509 meetings, and since 2001 he has edited
the PMI sections of the X.509 standard, incorporating several of the
features of the PERMIS implementation into the standard. More recently
support for other security standards has been included in PERMIS,
including OASIS SAML tokens (these are used by Shibboleth in the UK Access
Management Federation) and OASIS XACML request contexts and obligations.
Although the original PERMIS research was funded under the EC ISIS
programme (Jan 2001 — Sept 2002), the majority of the R&D has taken
place since 2005, at Kent. Since 2005 Chadwick (Kent 2004-present) has
attracted over £1.5m to Kent in PERMIS related grants, many of them in
collaboration with other partners. The overriding theme in this work has
been how to develop an easy to use, application-independent, authorisation
infrastructure with sophisticated access control features, which can be
used in distributed environments such as grids, clouds and federations, so
that authorisation is uniformly enforced throughout. Since 2005, over a
dozen RAs and PhDs have been involved in this research at Kent, including:
Bailey, Casenove, Fatema, Ferdous, Ferreira, Hibbert, Inman, Laborde,
Lievens, Nasser, Nguyen, Otenko, Shi, Su, Siu, Xu, and Zhao. All have been
successfully employed after graduation.
The key underpinning research contributions can be classified under 5
themes:
A. Usability — how to allow users and administrators to easily
write their authorisation policies in controlled natural language (EPSRC,
joint with Prof. Sasse, UCL and EC FW 7 project (TAS3), joint with 14
other partners). [1,4: references here refer to the publications listed in
section 3]
B. Application of well-known physical security capabilities to
electronic authorisation systems — how to implement Separation of
Duties in a federated system where there is no central control over role
assignment (JISC joint with CLRCC); how to introduce Break the Glass
functionality into RBAC systems, so that users can override `deny'
decisions in emergency situations (EC FP7 -TAS3). [4]
C. Development of novel electronic authorisation features — first
to design and implement privacy preserving attribute aggregation in
federated identity management systems (JISC funded), to add "sticky
policies" to a distributed application independent authorisation
infrastructure (EC FP7 -TAS3), and to coordinate authorisation decision
making throughout a distributed system such as a grid (EPSRC, joint with
Prof Basden, Salford). [3,4,5]
D. Integrating security standards — how to integrate a PMI into
SAML/Shibboleth (JISC funded) and first to show how NIST Levels of
Assurance can be integrated into authorisation decision making (JISC,
joint with Manchester).[4]
E. Integration with grid/cloud computing — How to integrate a
policy based authorisation infrastructure into Grids, in particular to
Globus Toolkit v4 (JISC funded), how to provide cloud services with a
privacy protecting authorisation infrastructure that allows a resource
owner to grant anyone access to any of his cloud resources at any time
(EPSRC funded) and how to define and build an architecture and set of Open
APIs for federated access to and sticky policy use in the OpenStack open
source cloud implementation (EPSRC, joint with Cranfield). [2,4,6]
References to the research
Note that the 4 references for Chadwick in REF2 relate to the
underpinning research above.
1. P Inglesant, MA Sasse, D Chadwick, LL Shi Expressions of
expertness: the virtuous circle of natural language for access control
policy specification ". 4th Symposium On Usable Privacy and
Security (SOUPS), July 23-25, 2008, Pittsburgh, PA. BEST PAPER AWARD (24
cites in Google Scholar).
2. RO Sinnott, DW Chadwick, T Doherty, D Martin, A Stell, G Stewart, L
Su, J Watt Advanced security for virtual organizations: The pros and
cons of centralized vs decentralized security models, Proc. 8th
IEEE International Symposium on Cluster Computing and the Grid (CCGrid
2008). (37 cites in Google Scholar).
3. David W Chadwick, Linying Su, Romain Laborde. "Coordinating Access
Control in Grid Services". Concurrency and Computation: Practice
and Experience, Volume 20, Issue 9, Pages 1071-1094, June 2008. (15
cites in Google Scholar).
4. David Chadwick, Gansen Zhao, Sassa Otenko, Romain Laborde, Linying Su
and Tuan Anh Nguyen. "PERMIS: a modular authorization infrastructure".
Concurrency And Computation: Practice And Experience. Volume 20, Issue
11, Pages 1341-1357, August 2008. (Listed in REF2) (58 cites in Google
Scholar).
5. David W. Chadwick, George Inman. "Attribute Aggregation in
Federated Identity Management". IEEE Computer, May 2009, pp 46-53
(31 cites in Google Scholar).
6. David W Chadwick, Kaniz Fatema. "A Privacy Preserving Authorisation
System for the Cloud". Journal of Computer and System Sciences,
vol 78, Issue 5, Sept 2012. pp 1359-1373 (listed in REF2). (4 cites in
Google Scholar)
Funding for this research. All grants have Chadwick as PI.
i) My Private Cloud. March 2011-July 2011. £50k. EPSRC
ii) Trusted Architecture for Securely Shared Services (TAS3). EC. Jan
2008-Dec 2011. €1,051k (€9.5M total)
iii) Integrating VOMS and PERMIS for Superior Secure Grid Management
(VPMan). JISC. March 2007-July 2008. £85k
iv) Shib-Grid Integrated Authorization (Shintau). JISC. March 2007-March
2009. £183k
v) Easy Expression of Authorisation Policies. EPSRC. Sept 2006-April
2008.£113k
vi) Participation in Grid Standards, EPSRC GridNet 2 grant. £12.5k July
2005-Dec 2007
vii) A Grid Authorisation API v2, JISC £43K, Oct 2005-June 2008
Details of the impact
With funding from UK and EC sources we have turned our research results
into open source code that has been exploited in multiple different
sectors. The objective of the PERMIS research has been to deliver proof of
concept privilege management infrastructure (PMI) software for the
software engineering community to experiment with, build into their
prototype applications, and if desired, re-engineer into commercial or
military grade products. In this way we achieve the highest possible
impact for the lowest cost.
The strategy has been very successful, and we have had 475 registrations
from Jan 2008 to July 2013, excluding all Kent users. Software downloads
have consistently been in the thousands per year, and between Aug 2009 and
July 2013 totalled nearly 14,000 (excluding Kent). An analysis of the
geographic spread, taken from the IP addresses of the top 20 downloaders
in 2012, shows the global reach of the impact: 6 from China; 2 from India,
2 from Taiwan, 5 from the USA, and 1 each from Vietnam, Rumania, France,
Israel, and the UK. (Note that a username and password are needed so they
are not accessible by web crawlers.)
As can be seen, the PERMIS software is being used globally, but being
security related, information about how PERMIS is being used and by whom
is kept confidential by most users, who provide pseudonyms when
registering for downloads. Gmail, yahoo, 163 and hotmail email addresses
are most commonly used. They invariably do not respond when asked for
details about how they are using PERMIS. However some users do identify
their organisations, and over the years registrations have been recorded
from Alcatel-Lucent, JMP Chase, Deloitte, South African Government,
Siemens, Thales, Adobe, Booz Allan and Orange. One major project that used
PERMIS was the €41million FI-Ware project (see http://www.fi-ppp.eu/projects/fi-ware/).
This is a consortium of all the major European Telecom providers, whose
goal is to "advance the global competitiveness of the EU economy by
introducing an innovative infrastructure for cost-effective creation and
delivery of services, providing high QoS and security guarantees."
From personal contacts and visits Chadwick knows that PERMIS has been
used for several years by a large multinational aerospace, defence and
security company (who wish to remain anonymous) in their research labs.
Initially the PERMIS authorisation decision engine was used for
authorisation decision making, and more recently the Delegation Issuing
Service has been integrated into many security use cases. Their objective
is to provide industry-ready solutions focused on role management and
authorization.
From email correspondence, Chadwick knows that a US based leading
provider of management consulting, technology, and engineering services is
evaluating the use of PERMIS as an alternative Policy Decision Point to be
used in an environment where standards based web services can be rapidly
built and deployed. No further details can be released due to the
sensitivity of the work.
Among the companies that are using PERMIS and are happy to share the
experience, we can report examples from the following domains: telecoms,
defence, virtualisation, audit:
Unizeto Technologies SA, Poland, [S4: references are to contacts
listed in Section 5] is working with the Polish Ministry of Economy and
Ministry of Justice in order to issue PERMIS X.509 AC's to either
individuals or companies, confirming that they have either private
economic activity
https://prod.ceidg.gov.pl/CEIDG/ceidg.public.ui/Search.aspx
or are established and registered in the national registry
https://ems.ms.gov.pl/krs/wyszukiwaniepodmiotu
The objective is to build a policy based authorisation system built on
AC's issued by the government.
The Toyota National College of Technology, Japan [S1] is using
PERMIS to provide RBAC access to its high security hypervisor called
BitVisor. The initial development of BitVisor was initiated by the
National Information Security Center of Japan in 2009. In the initial
development, Dr. Hirano designed the ID management functions of BitVisor
which required the user to have a smartcard with an X.509 certificate
before he can access a PC, but the PC was statically configured. Adding
PERMIS to Bitvisor allows the administrator to dynamically configure the
use of BitVisor on PCs. Dr Manabu Hirano from Toyota came as a visiting
researcher to work with Prof Chadwick from June 2012 to Jan 2013, in order
to perform the design and integration research. BitVisor is currently
being commercialised by IGEL, a Japanese SME.
The Swiss Ministry of Defence [S3] has especially rigorous
security standards and therefore need military grade software.
Consequently it has hardened the core components of PERMIS for use in an
air force application. It released the code back to the community as
Hardened PERMIS, originally via the EC OSOR web site — no longer
available, but the archive version is here:
http://web.archive.org/web/20111113084114/http://www.osor.eu/projects/openpermis
which kept statistics about its code base. It reported that:
"The estimated cost to develop this project is 1,810,915 EUROS This
project has 74,854 lines of code. To develop a similar application you
would need 18.58 person-years."
When the OSOR web site merged into the EC joinup web site in 2011,
Hardened PERMIS was moved to
https://joinup.ec.europa.eu/software/openpermis/home.
By way of comparison, the current PERMIS code base comprises over
235,000 lines of code, three times the size of Hardened PERMIS. So, using
the same estimation methodology, the potential economic value of it to the
community is approximately €5M.
Most organisations customise and build upon the PERMIS code.
Thales [S2] has been working on authorization and Role Based Access
Control for a number of years and have said that their "work would not
have been the same without the close cooperation we could establish with
Prof. D. W. Chadwick's team at University of Kent". Recently, Thales
has engaged one of its engineering teams to work within a cloud computing
collaborative project, under the auspices of OW2, which is an independent,
global, open-source software community. The OpenCloudWare project
covers many aspects of cloud computing, one of these being authorization,
which is a subproject led by Thales. The technical directions that they
are taking "are derived from those of PERMIS, which has to be viewed as
preliminary, mandatory project, that helped significantly to understand
the issues around Attribute Certificates". Thales is currently
delivering a stripped down library for X.509 attribute certificate
management that is "extremely close from the original PERMIS DIS".
Details about this work can be found at http://www.opencloudware.org.
Some organisations have contributed their enhancements back to us, making
them freely available to everyone. In particular:
— HP India provided us with source code for using our secure audit
service (SAWS) with .NET;
— CCLRC (now the Science and Technology Facilities Council — STFC) [S5]
provided us with a Python interface and a .NET interface to PERMIS.
Thales has produced French language variants of various components of
PERMIS for use in their French offices, but has not contributed these back
to the open source code base as yet.
In summary, PERMIS has had a broad and substantial impact on the security
of software used by hundreds of thousands of end users through being
incorporated into a range of systems in applications from different
sectors including military, commercial, and governmental. The
sustainability of the system has been underpinned by the contributions to
the open source project from the Swiss Army, HP and STFC amongst others.
Sources to corroborate the impact
[S1] Dr. Eng. Manabu Hirano, Dept of Information and Computer
Engineering, Toyota National College of Technology, has provided a
statement
http://www.cs.kent.ac.uk/research/REF2014/Hirano.pdf
[S2] Pascal Jakobi, Systems Architect, Thales, 1 av. A. Fresnel,
91767 Palaiseau, France. has provided a statement that validates claims
related to Thales.
http://www.cs.kent.ac.uk/research/REF2014/Jakobi.pdf
[S3] Riccardo Sibilia, Chief Cyber Threat Analyst of the Swiss
Army, Command Support Organisation, Centre for Electronic Operations,
commissioned the Swiss software house Ergon to re-engineer PERMIS into
Hardened PERMIS, as Kent did not want to undertake this purely programming
work. He can validate the claims about Hardened PERMIS.
[S4] Marcin Szulga, Head of Research and Development Department,
Unizeto Technologies SA is the project manager for the PERMIS project in
Poland, and can validate claims related to Unizeto Technologies SA, Poland
and the Polish Ministry of Economy.
[S5] Dr. Neil Geddes of STFC has given a statement that CCLRC
built Python and .NET interfaces for PERMIS. http://www.cs.kent.ac.uk/research/REF2014/Geddes.pdf