Constraining Credential Usage in Logic-Based Access Control

被引:5
|
作者
Bauer, Lujo [1 ]
Jia, Limin [1 ]
Sharma, Divya [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
Access control; Logic; Formal languages; Computer security; AUTHORIZATION;
D O I
10.1109/CSF.2010.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the consequences of these policies are derived using logical inference rules. Proofs in authorization logics can serve as capabilities for gaining access to resources. Because a proof is derived from a set of credentials possibly issued by different parties, the issuer of a specific credential may not be aware of all the proofs that her credential may make possible. From this credential issuer's standpoint, the policy expressed in her credential may thus have unexpected consequences. To solve this general problem, we propose a system in which credentials can specify constraints on how they are to be used. We show how to modularly extend well-studied authorization logics to support the specification and enforcement of such constraints. A novelty of our design is that we allow the constraints to be arbitrary well-behaved functions over authorization proofs. Since all the information about an access is contained in the proofs, this makes it possible to express many interesting constraints. We study the formal properties of such a system, and give examples of constraints.
引用
收藏
页码:154 / 168
页数:15
相关论文
共 50 条
  • [1] Distributed access control: A logic-based approach
    Barker, S
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 217 - 228
  • [2] Logic and logic-based control
    Hongsheng QI
    [J]. Control Theory and Technology, 2008, (01) : 26 - 36
  • [3] Logic and logic-based control
    Qi H.
    Cheng D.
    [J]. Journal of Control Theory and Applications, 2008, 6 (01): : 26 - 36
  • [4] Fuzzy Logic-Based Implicit Authentication for Mobile Access Control
    Yao, Feng
    Yerima, Suleiman Y.
    Kang, BooJoong
    Sezer, Sakir
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 968 - 975
  • [6] On logic-based intelligent control
    Qi, Hongsheng
    Cheng, Daizhan
    [J]. Proceedings of the 24th Chinese Control Conference, Vols 1 and 2, 2005, : 1082 - 1088
  • [7] Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
    Minami, Kazuhiro
    Borisov, Nikita
    Gunter, Carl A.
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 3 - 12
  • [8] Protecting personal data with various granularities: A logic-based access control approach
    Purevjii, BO
    Aritsugi, M
    Imai, S
    Kanamori, Y
    Pancake, CM
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 548 - 553
  • [9] COMPLEXITY CONTROL IN LOGIC-BASED PROGRAMMING
    MARKUSZ, Z
    KAPOSI, AA
    [J]. COMPUTER JOURNAL, 1985, 28 (05): : 487 - 495
  • [10] Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach
    Armando, Alessandro
    Carbone, Roberto
    Ranise, Silvio
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 356 - 363