Sophisticated Access Control via SMT and Logical Frameworks

Author:

Arkoudas Konstantine1,Chadha Ritu1,Chiang Jason1

Affiliation:

1. Applied Communications Sciences

Abstract

We introduce a new methodology for formulating, analyzing, and applying access-control policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) subset of typed first-order logic, and represented in a programmable logical framework, with each theory extending a core ontology of access control. We reduce both request evaluation and policy analysis to SMT solving, and provide experimental results demonstrating the practicality of these reductions. We also introduce a class of canonical requests and prove that such requests can be evaluated in linear time. In many application domains, access requests are either naturally canonical or can easily be put into canonical form. The resulting policy framework is more expressive than XACML and languages in the Datalog family, without compromising efficiency. Using the computational logic facilities of the framework, a wide range of sophisticated policy analyses (including consistency, coverage, observational equivalence, and change impact) receive succinct formulations whose correctness can be straightforwardly verified. The use of SMT solving allows us to efficiently analyze policies with complicated numeric (integer and real) constraints, a weak point of previous policy analysis systems. Further, by leveraging the programmability of the underlying logical framework, our system provides exceptionally flexible ways of resolving conflicts and composing policies. Specifically, we show that our system subsumes FIA (Fine-grained Integration Algebra), an algebra recently developed for the purpose of integrating complex policies.

Funder

U.S. Army

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference62 articles.

1. A calculus for access control in distributed systems

2. Policy Ratification

3. Efficient symbolic automated analysis of administrative attribute-based RBAC-policies

4. Anderson R. J. 2008. Security Engineering 2nd Ed. Wiley. Anderson R. J. 2008. Security Engineering 2nd Ed. Wiley.

5. Rule-based policy specification. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia Eds;Antoniou G.;Advances in Information Security Series,2007

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection;IEEE Access;2024

2. A forensics and compliance auditing framework for critical infrastructure protection;International Journal of Critical Infrastructure Protection;2023-09

3. SMT-Based Verification of NGAC Policies;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06

4. Detecting conflict of heterogeneous access control policies;Digital Communications and Networks;2022-10

5. A rewriting system for the assessment of XACML policies relationship;Computers & Security;2020-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3