A Logic-Based Safety Analysis Algorithm for Discretionary Access Control

被引:0
|
作者
YAN Xuexiong
机构
基金
国家高技术研究发展计划(863计划);
关键词
discretionary access control(DAC); safety analysis; logic; state transfer;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system states and state transfer rules.A general program based on this logic method is proposed for DAC safety analysis,but this program may never be terminal for some safety analysis goal.The safety analysis algorithm is achieved by simplifying the general program according to the property of the DAC model state transfer rules.This safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies for right transferring,and the policies for right permitting,respectively.
引用
收藏
页码:531 / 538
页数:8
相关论文
共 50 条
  • [1] Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
    Minami, Kazuhiro
    Borisov, Nikita
    Gunter, Carl A.
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 3 - 12
  • [2] Distributed access control: A logic-based approach
    Barker, S
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 217 - 228
  • [3] On safety in discretionary access control
    Li, NH
    Tripunitara, MV
    [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 96 - 109
  • [4] Constraining Credential Usage in Logic-Based Access Control
    Bauer, Lujo
    Jia, Limin
    Sharma, Divya
    [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 154 - 168
  • [5] Logic and logic-based control
    Hongsheng QI
    [J]. Control Theory and Technology, 2008, (01) : 26 - 36
  • [6] Logic and logic-based control
    Qi H.
    Cheng D.
    [J]. Journal of Control Theory and Applications, 2008, 6 (01): : 26 - 36
  • [7] Fuzzy Logic-Based Implicit Authentication for Mobile Access Control
    Yao, Feng
    Yerima, Suleiman Y.
    Kang, BooJoong
    Sezer, Sakir
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 968 - 975
  • [8] Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach
    Armando, Alessandro
    Carbone, Roberto
    Ranise, Silvio
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 356 - 363
  • [9] On logic-based intelligent control
    Qi, Hongsheng
    Cheng, Daizhan
    [J]. Proceedings of the 24th Chinese Control Conference, Vols 1 and 2, 2005, : 1082 - 1088
  • [10] Type based discretionary access control
    Bugliesi, M
    Colazzo, D
    Crafa, S
    [J]. CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239