Logic-based approach for enforcing access control

被引:0
|
作者
Bertino, Elisa [1 ]
Buccafurri, Francesco [1 ]
Ferrari, Elena [1 ]
Rullo, Pasquale [1 ]
机构
[1] Universita degli Studi di Milano, Milano, Italy
关键词
Computational linguistics - Data acquisition - Formal logic - Mathematical models;
D O I
10.3233/JCS-2000-82-303
中图分类号
学科分类号
摘要
This paper describes an advanced authorization mechanism based on a logic formalism. The model supports both positive and negative authorizations. It also supports derivation rules by which an authorization can be granted on the basis of the presence or absence of other authorizations. Subjects, objects and authorization types are organized into hierarchies, supporting a more adequate representation of their semantics. From the authorizations explicitly specified, additional authorizations are automatically derived by the system, based on those hierarchies. The combination of all the above features results in a powerful yet flexible access control mechanism. The logic formalism on which the system relies is an extension of Ordered Logic with ordered domains. This is an elegant yet powerful formalism whereby the basic concepts of the authorization model can be naturally formalized. Its semantics is based on the notion of stable model and assigns, to a given set of authorization rules, a multiplicity of (stable) models, each representing a possible way of assigning access authorizations. This form of non-determinism entails an innovative approach to enforce access control: when an access request is issued, the appropriate model (set of consistent access authorizations) is chosen, on the basis of the accesses currently under execution in the system.
引用
收藏
页码:109 / 139
相关论文
共 50 条
  • [31] TOOLS FOR LOGIC-BASED ACCESS TO EXISTING DATABASES IN DISTRIBUTED ENVIRONMENT
    SLAVOV, B
    TERZIEV, A
    MICROPROCESSING AND MICROPROGRAMMING, 1990, 28 (1-5): : 265 - 268
  • [32] A fuzzy logic-based tuning approach of PID control for steam turbines for solar applications
    Dettori, S.
    Iannino, V.
    Colla, V.
    Signorini, A.
    8TH INTERNATIONAL CONFERENCE ON APPLIED ENERGY (ICAE2016), 2017, 105 : 480 - 485
  • [33] A rewrite based approach for enforcing access constraints for XML
    Mohan, Sriram
    Sengupta, Arijit
    Wu, Yuqing
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 1081 - +
  • [34] Motion control for mobile robot obstacle avoidance and navigation: A fuzzy logic-based approach
    Zavlangas, Panagiotis G.
    Tzafestas, Spyros G.
    Systems Analysis Modelling Simulation, 2003, 43 (12): : 1625 - 1637
  • [35] An adaptive Fuzzy logic-based approach to PID control of steam turbines in solar applications
    Dettori, S.
    Iannino, V
    Colla, V
    Signorini, A.
    APPLIED ENERGY, 2018, 227 : 655 - 664
  • [36] A Logic-Based Approach for the Verification of UML Timed Models
    Baresi, Luciano
    Morzenti, Angelo
    Motta, Alfredo
    Pourhashem, Mohammad Mehdi K.
    Rossi, Andmatteo
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2017, 26 (02)
  • [37] A logic-based approach to scheduling problems with resource constraints
    Pinto, JM
    Grossmann, IE
    COMPUTERS & CHEMICAL ENGINEERING, 1997, 21 (08) : 801 - 818
  • [38] A Semantic Logic-Based Approach to Determine Textual Similarity
    Blanco, Eduardo
    Moldovan, Dan
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2015, 23 (04) : 683 - 693
  • [39] Conceptual modelling for configuration: A description logic-based approach
    McGuinness, Deborah L.
    Wright, Jon R.
    Artificial Intelligence for Engineering Design, Analysis and Manufacturing: AIEDAM, 1998, 12 (04): : 333 - 344
  • [40] A fuzzy logic-based approach for groundwater vulnerability assessment
    Vahid Nourani
    Sana Maleki
    Hessam Najafi
    Aida Hosseini Baghanam
    Environmental Science and Pollution Research, 2024, 31 : 18010 - 18029