Affiliation:
1. DSI, Università di Milano, Milano, Italy
2. DISI, Università di Genova, Genova, Italy
3. DSCFM, Università dell'Insubria, Como, Italy
Abstract
The increased awareness of the importance of data protection has made access control a relevant component of current data management systems. Moreover, emerging applications and data models call for flexible and expressive access control models. This has led to an extensive research activity that has resulted in the definition of a variety of access control models that differ greatly with respect to the access control policies they support. Thus, the need arises for developing tools for reasoning about the characteristics of these models. These tools should support users in the tasks of model specification, analysis of model properties, and authorization management. For example, they must be able to identify inconsistencies in the model specification and must support the administrator in comparing the expressive power of different models. In this paper, we make a first step in this direction by proposing a formal framework for reasoning about access control models. The framework we propose is based on a logical formalism and is general enough to model discretionary, mandatory, and role-based access control models. Each instance of the proposed framework corresponds to a C-Datalog program, interpreted according to a stable model semantics. In the paper, besides giving the syntax and the formal semantics of our framework, we show some examples of its application. Additionally, we present a number of dimensions along which access control models can be analyzed and compared. For each dimension, we show decidability results and we present some examples of its application.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference43 articles.
1. A content-based authorization model for digital libraries
2. AGG. See http://tfs.cs.tu-berlin.de/agg/docu.html. AGG. See http://tfs.cs.tu-berlin.de/agg/docu.html.
3. A Petri Net Based Safety Analysis of Workflow Authorization Models;Atluri V.;J. Comput. Secu.,2000
Cited by
86 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN;Cyber Security and Applications;2023-12
2. Analysis of the Expressive Power of DIFC Model Based on Temporal Logic;2022 7th International Conference on Signal and Image Processing (ICSIP);2022-07-20
3. A joint sharing approach for online privacy preservation;World Wide Web;2021-04-24
4. Mutual Authorizations;Proceedings of the 24th ACM Symposium on Access Control Models and Technologies;2019-05-28
5. Specification and Analysis of ABAC Policies via the Category-based Metamodel;Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy;2019-03-13