Access control via belnap logic: Intuitive, expressive, and analyzable policy composition
@article{Bruns2011AccessCV, title={Access control via belnap logic: Intuitive, expressive, and analyzable policy composition}, author={Glenn Bruns and Michael Huth}, journal={ACM Trans. Inf. Syst. Secur.}, year={2011}, volume={14}, pages={9:1-9:27} }
Access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition that is intuitive, formal (and so “analyzable” and “implementable”), expressive, independent of specific application domains, and yet able to be extended to create domain-specific instances. Here we develop such a framework based on Belnap logic. An access-control policy is interpreted as a four-valued predicate that maps access requests to either…
53 Citations
Sophisticated Access Control via SMT and Logical Frameworks
- Computer ScienceTSEC
- 2014
By leveraging the programmability of the underlying logical framework, the system provides exceptionally flexible ways of resolving conflicts and composing policies, and shows that the system subsumes FIA (Fine-grained Integration Algebra), an algebra recently developed for the purpose of integrating complex policies.
Relationship-based access control: its expression and enforcement through hybrid logic
- BusinessCODASPY '12
- 2012
This work identifies a fragment of hybrid logic to be used for expressing relationship-based access-control policies, shows that this fragment supports important policy idioms, and demonstrates that it removes an exponential penalty in existing attempts of specifying complex relationships such as "at least three friends".
Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control
- Computer ScienceSACMAT
- 2018
This work proposes to recasting the high-level structure of ABAC models in a logical formalism that treats all actions uniformly and that keeps existing policy languages in place by interpreting their attributes in terms of the restructured model.
Extending Multivalued Dependencies for Refactoring Access Control Policies
- Computer Science
- 2013
This paper focuses on policy refactoring, i.e., the task of finding the least permissive rewriting of a collection of policies such that the global composed policy remains identical, and argues that normalization theory can help to solve the refactored problem.
Policy-Based Access Control from Numerical Evidence 1
- Computer Science
- 2013
This work proposes a framework for policy languages, based on semi-rings, that aggregate quantitative evidence to support decision-making in access control systems and discusses a number of applications, including vacuity, redundancy, change-impact and safety analysis.
An Expressive, Flexible and Uniform Logical Formalism for Attribute-based Access Control
- Computer Science
- 2018
This paper recasts the high-level structure of ABAC models in a logical formalism that treats all types of actions uniformly, and provides improved flexibility in supporting a variety of different requirements depending on the domain.
Towards A Generic Formal Framework for Access Control Systems
- Computer ScienceArXiv
- 2012
This paper develops a formal characterization of the features of an access control model that imposes few restrictions, and considers the properties of monotonicity and completeness, the first being particularly important for attribute-based access control systems.
Monotonicity and Completeness in Attribute-Based Access Control
- Computer ScienceSTM
- 2014
This paper develops a formal characterization of the features of an access control model that imposes few restrictions, and considers the properties of monotonicity and completeness, the first being particularly important for attribute-based access control systems.
Relationships, Paths and Principal Matching: A New Approach to Access Control
- Computer ScienceArXiv
- 2015
The relationships, paths and principal matching model described here is a formal access control model using relationships and a two-stage request evaluation process that allows for more powerful policies to be defined than those based solely on the commonly used concept of role membership.
Refactoring multi-layered access control policies through (De)composition
- Computer ScienceProceedings of the 9th International Conference on Network and Service Management (CNSM 2013)
- 2013
This paper proposes a flexible access control framework able to provide a comprehensive view of the global access control policy implemented in a given system and lays down the theoretical foundations of this framework that allows to describe authorization policies from different architecture layers.
References
SHOWING 1-10 OF 72 REFERENCES
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
- Computer Science2008 21st IEEE Computer Security Foundations Symposium
- 2008
This work defines a query language in which policy analysis questions can be phrased, and establishes expressiveness results showing that all data independent policies can be expressed in the policy language.
A simple and expressive semantic framework for policy composition in access control
- Computer ScienceFMSE '07
- 2007
This work defines an access controlpolicy as a four-valued predicate that maps accesses to either grant, deny, conflict, or unspecified, and proposes a basic query language that can reduce important analyses to checks of policy refinement.
An algebra for composing access control policies
- Computer ScienceTSEC
- 2002
An algebra of security policies together with its formal semantics is proposed and how to formulate complex policies in the algebra is illustrated, which provides the basis for the implementation of the algebra.
Access control policy combining: theory meets practice
- Computer ScienceSACMAT '09
- 2009
A policy combining language PCL, which can succinctly and precisely express a variety of PCAs, which is based on automata theory and linear constraints, and is more expressive than existing approaches.
Using first-order logic to reason about policies
- Computer Science16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.
- 2003
It is shown that a fragment of (multi-sorted) first-order logic can be used to represent and reason about policies, and that further restricting the fragment results in a language that is still quite expressive yet is also tractable.
Delegation logic: A logic-based approach to distributed authorization
- Computer ScienceTSEC
- 2003
D1LP provides a concept of proof-of-compliance that is founded on well-understood principles of logic programming and knowledge representation, and provides a logical framework for studying delegation.
Flexible support for multiple access control policies
- Computer ScienceTODS
- 2001
A unified framework that can enforce multiple access control policies within a single system and be enforced by the same security server is presented, based on a language through which users can specify security policies to be enforced on specific accesses.
Defeasible security policy composition for web services
- Computer ScienceFMSE '06
- 2006
The concept of defeasibles policy composition is explored, wherein policies are represented in defeasible logic and composition is based on rules for non-monotonic inference, which enables policy writers to assert rules tentatively and provides a practical system that is efficiently automated by computers.
An algebra for fine-grained integration of XACML policies
- Computer ScienceSACMAT '09
- 2009
An algebra for fine-grained integration of sophisticated policies of collaborating parties, which consists of three binary and two unary operations, is able to support the specification of a large variety of integration constraints.
D-algebra for composing access control policy decisions
- Mathematics, Computer ScienceASIACCS '09
- 2009
This paper proposes a D-algebra to compose decisions from multiple access control policies, namely the analysis of policy languages decision mechanisms, and the development of tools for policy authoring and enforcement.