2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.10
|View full text |Cite
|
Sign up to set email alerts
|

Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis

Abstract: It is difficult to develop and manage large, multi-author access control policies without a means to compose larger policies from smaller ones. Ideally, an access-control policy language will have a small set of simple policy combinators that allow for all desired policy compositions. In [5], a policy language was presented having policy combinators based on Belnap logic, a four-valued logic in which truth values correspond to policy results of "grant", "deny", "conflict", and "undefined". We show here how pol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
46
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 33 publications
(47 citation statements)
references
References 19 publications
1
46
0
Order By: Relevance
“…From a technical perspective, it is important to establish whether our language can accommodate a fourth decision value to represent conflicting decisions from sub-policies [6]. Equally important is to establish what set of binary operators would be sufficient to articulate any desired policy.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…From a technical perspective, it is important to establish whether our language can accommodate a fourth decision value to represent conflicting decisions from sub-policies [6]. Equally important is to establish what set of binary operators would be sufficient to articulate any desired policy.…”
Section: Discussionmentioning
confidence: 99%
“…Informally, when evaluating a request q with respect to some policy p, we first determine whether p is applicable to q. The role of π in our policy language is similar to that of <Target> and <Condition> elements in XACML rules and policies [12], or of access predicates in [6]. We refer to π as the applicability predicate.…”
Section: A Simple Policy Languagementioning
confidence: 99%
“…Although there is a substantial body of work on policy specification [1,4,5,13,17], this prior work assumes a very restricted format for access requests and targets. To the best of our knowledge, there is no previous work on a formal language for target specification and evaluation, let alone the consideration of missing attributes names.…”
Section: Related Workmentioning
confidence: 99%
“…Our main objective is to define a policy language that addresses the same problem space as XACML 3.0 [15] while retaining the formality of recent work on policy algebras [1,4,5,6,17]. XACML (eXtensible access control markup language) is a standardized language: XACML 2.0 was ratified in 2005; XACML 3.0 will add support for attribute-based access control and policy administration.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, in [9,10] the authors define a simple but powerful framework for representing and reasoning about accesscontrol policy composition. The semantics for access requests is four-valued: permit, deny, undefined, and conflict.…”
Section: Related Workmentioning
confidence: 99%