Logic-based approach for enforcing access control

被引:0
|
作者
Bertino, Elisa [1 ]
Buccafurri, Francesco [1 ]
Ferrari, Elena [1 ]
Rullo, Pasquale [1 ]
机构
[1] Universita degli Studi di Milano, Milano, Italy
关键词
Computational linguistics - Data acquisition - Formal logic - Mathematical models;
D O I
10.3233/JCS-2000-82-303
中图分类号
学科分类号
摘要
This paper describes an advanced authorization mechanism based on a logic formalism. The model supports both positive and negative authorizations. It also supports derivation rules by which an authorization can be granted on the basis of the presence or absence of other authorizations. Subjects, objects and authorization types are organized into hierarchies, supporting a more adequate representation of their semantics. From the authorizations explicitly specified, additional authorizations are automatically derived by the system, based on those hierarchies. The combination of all the above features results in a powerful yet flexible access control mechanism. The logic formalism on which the system relies is an extension of Ordered Logic with ordered domains. This is an elegant yet powerful formalism whereby the basic concepts of the authorization model can be naturally formalized. Its semantics is based on the notion of stable model and assigns, to a given set of authorization rules, a multiplicity of (stable) models, each representing a possible way of assigning access authorizations. This form of non-determinism entails an innovative approach to enforce access control: when an access request is issued, the appropriate model (set of consistent access authorizations) is chosen, on the basis of the accesses currently under execution in the system.
引用
收藏
页码:109 / 139
相关论文
共 50 条
  • [1] Distributed access control: A logic-based approach
    Barker, S
    COMPUTER NETWORK SECURITY, 2003, 2776 : 217 - 228
  • [2] Protecting personal data with various granularities: A logic-based access control approach
    Purevjii, BO
    Aritsugi, M
    Imai, S
    Kanamori, Y
    Pancake, CM
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 548 - 553
  • [3] Constraining Credential Usage in Logic-Based Access Control
    Bauer, Lujo
    Jia, Limin
    Sharma, Divya
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 154 - 168
  • [4] Logic and logic-based control
    Hongsheng QI
    Journal of Control Theory and Applications, 2008, (01) : 26 - 36
  • [5] Logic and logic-based control
    Qi H.
    Cheng D.
    J. Control Theory Appl., 2008, 1 (26-36): : 26 - 36
  • [6] Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach
    Armando, Alessandro
    Carbone, Roberto
    Ranise, Silvio
    FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 356 - 363
  • [7] Fuzzy Logic-Based Implicit Authentication for Mobile Access Control
    Yao, Feng
    Yerima, Suleiman Y.
    Kang, BooJoong
    Sezer, Sakir
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 968 - 975
  • [9] A Fuzzy Logic-Based Approach for HVAC Systems Control
    Berouine, A.
    Akssas, E.
    Naitmalek, Y.
    Lachhab, F.
    Bakhouya, M.
    Ouladsine, R.
    Essaaidi, M.
    2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019, : 1510 - 1515
  • [10] A logic-based approach to model supervisory control systems
    Dell'Acqua, Pierangelo
    Lombardi, Anna
    Pereira, Luis Moniz
    FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2006, 4203 : 534 - 539