Argumentation for access control

被引:0
|
作者
Boella, G [1 ]
Hulstijn, J
van der Torre, L
机构
[1] Univ Turin, Turin, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] CWI, NL-1009 AB Amsterdam, Netherlands
[4] Delft Univ Technol, Delft, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual organizations. We use a logical framework which contains agents with objectives concerning access to a resource or provision of a service, including security objectives. The access control mechanism is described by a set of policy rules, that specify that access to a resource or service requires a specific set of credentials. Our contribution is a formalization of the reasoning about access control using a planning theory formalized in Dung's abstract argumentation framework. We build on Amgoud's argumentation framework for plan arguments, which is based on an adaptation of Dung's notion of defence. Our formal argumentation framework allows arguments about the backward derivation of plans from objectives and policy rules (abduction), as well as arguments about the forward derivation of goals from general objectives. We show that reasoning about the feasibility of goals requires mixed goal-plan arguments, and we show how to formalize the plan arguments in Dung's framework without adapting the notion of defence.
引用
收藏
页码:86 / 97
页数:12
相关论文
共 50 条
  • [21] Access control, reverse access control and replication control in a world wide distributed system
    Popescu, BC
    Gamage, C
    Tanenbaum, AS
    [J]. ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 155 - 167
  • [22] ACCESS CONTROL, REVERSE ACCESS CONTROL AND REPLICATION CONTROL IN A WORLD WIDE DISTRIBUTED SYSTEM
    Popescu, Bogdan C.
    Gamage, Chandana
    Tanenbaum, Andrew S.
    [J]. IFIP Advances in Information and Communication Technology, 2002, 100 : 155 - 167
  • [23] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [24] Access control in distributed object systems: Problems with access control lists
    Nagaraj, SV
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 163 - 164
  • [25] Computable Access Control: Embedding Access Control Rules Into Euclidean Space
    Dong, Lijun
    Wu, Tiejun
    Jia, Wei
    Jiang, Bo
    Li, Xinchuan
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (10): : 6530 - 6541
  • [26] Access Control Policy Generation Method Based on Access Control Logs
    Liu Aodi
    Du Xuehui
    Wang Na
    Shan Dibin
    Zhang Liu
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 324 - 331
  • [27] Argumentation for explicit representation of control within enterprise modelling and integration
    Vallespir, B
    Chen, D
    Doumeingts, G
    [J]. ENTERPRISE INTER- AND INTRA-ORGANIZATIONAL INTEGRATION: BUILDING INTERNATIONAL CONSENSUS, 2003, 108 : 417 - 424
  • [28] On Multiple Access Random Medium Access Control
    Cui, Tao
    Ho, Tracey
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1869 - 1873
  • [29] Access control with IBM Tivoli Access Manager
    Karjoth, Günter
    [J]. ACM Transactions on Information and System Security, 2003, 6 (02) : 232 - 257
  • [30] Management of access privileges for dynamic access control
    Zhu, Nafei
    Cai, Fangbo
    He, Jingsha
    Zhang, Yixuan
    Li, Wenxin
    Li, Zhao
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8899 - S8917