×

A metamodel of access control for distributed environments: applications and properties. (English) Zbl 1360.68206

Summary: We describe a metamodel for access control, designed to take into account the specific requirements of distributed environments. We see a distributed system consisting of several sites, each with its own resources to protect, as a federation, and propose a framework for the specification (and enforcement) of global access control policies that take into account the local policies specified by each member of the federation. The framework provides mechanisms to specify heterogeneous local access control policies, to define policy composition operators, and to use them to define conflict-free access authorisation decisions. We use a declarative formalism in order to give an operational semantics to the distributed metamodel. We then show how properties of policies can be directly obtained from standard results for the operational semantics of access request evaluation.

MSC:

68M14 Distributed systems
68Q42 Grammars and rewriting systems
68Q55 Semantics in the theory of computing

Software:

A3PAT; ITP; OBJ3; Jakarta; SCC; Maude
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Abadi, M.; Burrows, M.; Lampson, B. W.; Plotkin, G. D., A calculus for access control in distributed systems, ACM Trans. Program. Lang. Syst., 15, 4, 706-734 (1993)
[2] Armando, A.; Compagna, L.; Lieler, Y., Automatic compilation of protocol insecurity problems into logic programming, (Proc. of JELIA’04. Proc. of JELIA’04, Lect. Notes Comput. Sci., vol. 3229 (2004)) · Zbl 1111.68376
[3] Baader, F.; Nipkow, T., Term Rewriting and All That (1998), Cambridge University Press
[4] Baral, C.; Gelfond, M., Logic programming and knowledge representation, J. Log. Program., 19/20, 73-148 (1994) · Zbl 0820.68028
[5] Barbanera, F.; Fernández, M., Intersection type assignment systems with higher-order algebraic rewriting, Theor. Comput. Sci., 170, 173-207 (1996) · Zbl 0874.03016
[6] Barendregt, H. P., The Lambda Calculus: Its Syntax and Semantics (1984), North-Holland · Zbl 0551.03007
[7] Barker, S., The next 700 access control models or a unifying meta-model?, (Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009 (2009), ACM Press), 187-196
[8] Barker, S.; Boella, G.; Gabbay, D. M.; Genovese, V., A meta-model of access control in a fibred security language, Stud. Log., 92, 3, 437-477 (2009) · Zbl 1181.03031
[9] Barker, S.; Fernández, M., Term rewriting for access control, (Proceedings of DBSEC 2006 on Data and Applications Security. Proceedings of DBSEC 2006 on Data and Applications Security, Lect. Notes Comput. Sci. (2006), Springer-Verlag)
[10] Barker, S.; Stuckey, P., Flexible access control policy specification with constraint logic programming, ACM Trans. Inf. Syst. Secur., 6, 4, 501-546 (2003)
[11] Barthe, G.; Dufay, G.; Huisman, M.; Melo de Sousa, S., Jakarta: a toolset to reason about the JavaCard platform, (Proceedings of e-SMART’01. Proceedings of e-SMART’01, Lect. Notes Comput. Sci., vol. 2140 (2002), Springer-Verlag) · Zbl 1002.68649
[12] Becker, M. Y.; Fournet, C.; Gordon, A. D., Design and semantics of a decentralized authorization language, (Proc. of the 20th IEEE Computer Security Foundations Symposium. Proc. of the 20th IEEE Computer Security Foundations Symposium, CSF 2007 (2007), IEEE Computer Society), 3-15
[14] Bertino, E.; Catania, B.; Ferrari, E.; Perlasca, P., A logical framework for reasoning about access control models, (Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Litton-TASC. Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Litton-TASC, SACMAT 2001, Chantilly, Virginia, USA, May 3-4, 2001 (2001), ACM), 41-52
[15] Bertolissi, C.; Fernández, M., A rewriting framework for the composition of access control policies, (Proceedings of the 10th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming. Proceedings of the 10th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP’08, Valencia, 2008 (2008), ACM Press)
[16] Bertolissi, C.; Fernández, M., Time and location based services with access control, (2nd International Conference on New Technologies, Mobility and Security. 2nd International Conference on New Technologies, Mobility and Security, NTMS 2008, Tangier, Morocco, 2008 (2008), IEEE), 1-6
[17] Bertolissi, C.; Fernández, M., Distributed event-based access control, Int. J. Inf. Comput. Secur., 3, 3-4 (2009), Special Issue: selected papers from Crisis 2008
[18] Bertolissi, C.; Fernández, M., Category-based authorisation models: operational semantics and expressive power, (Proc. of Int. Symposium on Engineering Secure Software and Systems. Proc. of Int. Symposium on Engineering Secure Software and Systems, ESSOS 2010, Pisa. Proc. of Int. Symposium on Engineering Secure Software and Systems. Proc. of Int. Symposium on Engineering Secure Software and Systems, ESSOS 2010, Pisa, Lect. Notes Comput. Sci., vol. 5965 (2010), Springer), 140-156
[19] Bertolissi, C.; Fernández, M., Rewrite specifications of access control policies in distributed environments, (Proc. of the 6th Workshop on Security and Trust Management. Proc. of the 6th Workshop on Security and Trust Management, STM 2010, Athens, Greece, 2010. Proc. of the 6th Workshop on Security and Trust Management. Proc. of the 6th Workshop on Security and Trust Management, STM 2010, Athens, Greece, 2010, Lect. Notes Comput. Sci., vol. 6710 (2011), Springer)
[20] Bertolissi, C.; Fernández, M.; Barker, S., Dynamic event-based access control as term rewriting, (Proceedings of DBSEC 2007 on Data and Applications Security XXI. Proceedings of DBSEC 2007 on Data and Applications Security XXI, Lect. Notes Comput. Sci., vol. 4602 (2007), Springer-Verlag)
[21] Bertolissi, C.; Uttha, W., Automated analysis of rule-based access control policies, (Proc. of the 6th Workshop on Programming Languages Meet Program Verification. Proc. of the 6th Workshop on Programming Languages Meet Program Verification, PLPV’13, Rome, Italy, January 22, 2013 (2013), ACM), affiliated with POPL’13
[22] Bonatti, P.; de Capitani di Vimercati, S.; Samarati, P., A modular approach to composing access control policies, (Proceedings of the 7th ACM Conference on Computer and Communications Security. Proceedings of the 7th ACM Conference on Computer and Communications Security, CCS’00 (2000), ACM Press: ACM Press New York, NY, USA), 164-173
[23] Bonatti, P. A.; Samarati, P., Logics for authorization and security, (Chomicki, J.; van der Meyden, R.; Saake, G., Logics for Emerging Applications of Databases (2003), Springer), 277-323
[24] Chandran, S. M.; Joshi, J. B.D., LoT-RBAC: a location and time-based rbac model, (Proc. of the 6th International Conference on Web Information Systems Engineering. Proc. of the 6th International Conference on Web Information Systems Engineering, WISE 2005, NY, USA, 2005. Proc. of the 6th International Conference on Web Information Systems Engineering. Proc. of the 6th International Conference on Web Information Systems Engineering, WISE 2005, NY, USA, 2005, Lect. Notes Comput. Sci., vol. 3806 (2005), Springer), 361-375
[25] Cirstea, H.; Kirchner, C., The rewriting calculus - Part I, Log. J. IGPL, 9, 363-399 (May 2001), also available as Technical Report A01-R-203, LORIA, Nancy (France)
[26] Cirstea, H.; Kirchner, C., The rewriting calculus - Part II, Log. J. IGPL, 9, 401-434 (May 2001), also available as Technical Report A01-R-204, LORIA, Nancy (France)
[27] Clavel, M.; Durán, F.; Eker, S.; Lincoln, P.; Martí-Oliet, N.; Meseguer, J.; Talcott, C., The Maude 2.0 system, (Rewriting Techniques and Applications. Rewriting Techniques and Applications, RTA 2003. Rewriting Techniques and Applications. Rewriting Techniques and Applications, RTA 2003, Lect. Notes Comput. Sci., vol. 2706 (2003), Springer-Verlag), 76-87 · Zbl 1038.68559
[28] Contejean, É.; Paskevich, A.; Urbain, X.; Courtieu, P.; Pons, O.; Forest, J., A3pat, an approach for certified automated termination proofs, (Proc. of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation. Proc. of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM’10 (2010), ACM: ACM New York, NY, USA), 63-72
[29] Coppo, M.; Dezani-Ciancaglini, M., An extension of the basic functionality theory for the \(λ\)-calculus, Notre Dame J. Form. Log., 21, 4, 685-693 (1980) · Zbl 0423.03010
[30] De Capitani di Vimercati, S.; Samarati, P., Authorization specification and enforcement in federated database systems, J. Comput. Secur., 5, 155-188 (March 1997)
[32] Dougherty, D. J.; Lescanne, P.; Liquori, L.; Lang, F., Addressed term rewriting systems: syntax, semantics and pragmatics, (Proceedings of TERMGRAPH 2004. Proceedings of TERMGRAPH 2004, Electron. Notes Theor. Comput. Sci. (2005), Elsevier) · Zbl 1272.68177
[33] Dougherty, D. J.; Fisler, K.; Krishnamurthi, S., Specifying and reasoning about dynamic access-control policies, (Furbach, Ulrich; Shankar, Natarajan, Proc. of IJCAR’06. Proc. of IJCAR’06, Lect. Notes Comput. Sci., vol. 4130 (2006), Springer), 632-646 · Zbl 1222.68361
[34] Dougherty, D. J.; Kirchner, C.; Kirchner, H.; Santana de Oliveira, A., Modular access control via strategic rewriting, (Proceedings of 12th European Symposium On Research In Computer Security. Proceedings of 12th European Symposium On Research In Computer Security, ESORICS (2007)), 578-593
[35] Echahed, R.; Prost, F., Security policy in a declarative style, (Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming. Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP’05 (2005), ACM Press)
[36] Escobar, S.; Meadows, C.; Meseguer, J., A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Theor. Comput. Sci., 367, 162-202 (November 2006)
[37] Fernández, M., Narrowing based procedures for equational disunification, Appl. Algebra Eng. Commun. Comput., 3, 1-26 (1992) · Zbl 0752.68048
[38] Fernández, M.; Jouannaud, J.-P., Modular termination of term rewriting systems revisited, (Proc. of the 10th Workshop on Specification of Abstract Data Types on Recent Trends in Data Type Specification. Proc. of the 10th Workshop on Specification of Abstract Data Types on Recent Trends in Data Type Specification, ADT’94, Santa Margherita, Italy. Proc. of the 10th Workshop on Specification of Abstract Data Types on Recent Trends in Data Type Specification. Proc. of the 10th Workshop on Specification of Abstract Data Types on Recent Trends in Data Type Specification, ADT’94, Santa Margherita, Italy, Lect. Notes Comput. Sci., vol. 906 (1995))
[39] Goguen, J.; Winkler, T.; Meseguer, J.; Futatsugi, K.; Jouannaud, J.-P., Introducing OBJ, (Malcolm, G., Software Engineering with OBJ: Algebraic Specification in Action (2000), Kluwer)
[40] Habib, L.; Jaume, M.; Morisset, Charles, Formal definition and comparison of access control models, J. Inf. Assur. Secur., 4, 372-378 (2009)
[41] Hendrix, J.; Clavel, M.; Meseguer, J., A sufficient completeness reasoning tool for partial specifications, (Proc. of the 16th Int. Conference on Term Rewriting and Applications. Proc. of the 16th Int. Conference on Term Rewriting and Applications, RTA 2005, Nara, Japan, 2005. Proc. of the 16th Int. Conference on Term Rewriting and Applications. Proc. of the 16th Int. Conference on Term Rewriting and Applications, RTA 2005, Nara, Japan, 2005, Lect. Notes Comput. Sci., vol. 3467 (2005), Springer), 165-174 · Zbl 1078.68668
[42] Jagadeesan, R.; Saraswat, V., Timed constraint programming: a declarative approach to usage control, (Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming. Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP’05 (2005), ACM Press)
[43] Jajodia, S.; Samarati, P.; Sapino, M.; Subrahmaninan, V. S., Flexible support for multiple access control policies, ACM Trans. Database Syst., 26, 2, 214-260 (2001) · Zbl 1136.68383
[44] Jajodia, S.; Samarati, P.; Subrahmanian, V. S.; Bertino, E., A unified framework for enforcing multiple access control policies, SIGMOD Rec., 26, 2, 474-485 (1997)
[45] Jonscher, D.; Dittrich, K. R., An approach for building secure database federations, (Proceedings of the 20th International Conference on Very Large Data Bases. Proceedings of the 20th International Conference on Very Large Data Bases, VLDB’94, San Francisco, CA, USA (1994)), 24-35
[46] Klop, J.-W.; van Oostrom, V.; van Raamsdonk, F., Combinatory reduction systems, introduction and survey, Theor. Comput. Sci., 121, 279-308 (1993) · Zbl 0796.03024
[47] Koch, M.; Mancini, L.; Parisi-Presicce, F., A graph based formalism for RBAC, (Proc. of the 9th ACM Symposium on Access Control Models and Technologies. Proc. of the 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, New York, USA, 2004 (2004)), 129-187
[48] Krishnan, R.; Sandhu, R. S.; Niu, J.; Winsborough, W. H., Foundations for group-centric secure information sharing models, (Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009 (2009), ACM), 115-124
[49] Li, N.; Mitchell, J. C.; Winsborough, W. H., Design of a role-based trust-management framework, (IEEE Symposium on Security and Privacy (2002)), 114-130
[50] Li, N.; Wang, Q.; Qardaji, W. H.; Bertino, E.; Rao, P.; Lobo, J.; Lin, D., Access control policy combining: theory meets practice, (Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009 (2009), ACM), 135-144
[51] Martelli, A.; Montanari, U., An efficient unification algorithm, ACM Trans. Program. Lang. Syst., 4, 2, 258-282 (1982) · Zbl 0478.68093
[52] McLean, John, The algebra of security, (Proceedings of the 1988 IEEE Conference on Security and Privacy. Proceedings of the 1988 IEEE Conference on Security and Privacy, SP’88 (1988), IEEE Computer Society: IEEE Computer Society Washington, DC, USA), 2-7
[53] Newman, M. H.A., On theories with a combinatorial definition of equivalence, Ann. Math., 43, 2, 223-243 (1942) · Zbl 0060.12501
[54] OASIS, eXtensible Access Control Markup language (XACML) (2003)
[55] Sandhu, R.; Coyne, E.; Feinstein, H.; Youman, C., Role-based access control models, IEEE Comput., 29, 2, 38-47 (1996)
[56] Sandhu, R. S.; Krishnan, R.; Niu, J.; Winsborough, W. H., Group-centric models for secure and agile information sharing, (Proc. of the 5th Int. Conference MMM-ACNS 2010. Proc. of the 5th Int. Conference MMM-ACNS 2010, St. Petersburg, Russia, 2010. Proc. of the 5th Int. Conference MMM-ACNS 2010. Proc. of the 5th Int. Conference MMM-ACNS 2010, St. Petersburg, Russia, 2010, Lect. Notes Comput. Sci., vol. 6258 (2010), Springer), 55-69
[57] Santana de Oliveira, A., Réécriture et Modularité pour les Politiques de Sécurité (2008), Université Henri Poincaré: Université Henri Poincaré Nancy, France, PhD thesis
[58] Santana de Oliveira, A.; Ke Wang, E.; Kirchner, C.; Kirchner, H., Weaving rewrite-based access control policies, (Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering. Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 (2007), ACM), 71-80
[59] van Bakel, S.; Fernández, M., Normalization results for typeable rewrite systems, Inf. Comput., 133, 2, 73-116 (1997) · Zbl 0877.68072
[60] Viganò, L., Automated security protocol analysis with the AVISPA tool, (Proc. of MFPS’05. Proc. of MFPS’05, Electron. Notes Theor. Comput. Sci., vol. 155 (2005), Elsevier), 61-86
[61] Wijesekera, D.; Jajodia, S., A propositional policy algebra for access control, ACM Trans. Inf. Syst. Secur., 6, 2, 286-325 (2003)
[62] Yoshida, N., Channel dependent types for higher-order mobile processes, (Proc. of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Proc. of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy (2004), ACM), 147-160 · Zbl 1325.68162
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.