DocumentCode
2009929
Title
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
Author
Bruns, Glenn ; Huth, Michael
fYear
2008
fDate
23-25 June 2008
Firstpage
163
Lastpage
176
Abstract
It is difficult to develop and manage large, multi-author access control policies without a means to compose larger policies from smaller ones. Ideally, an access-control policy language will have a small set of simple policy combinators that allow for all desired policy compositions. In cite{BH07}, a policy language was presented having policy combinators based on Belnap logic, a four-valued logic in which truth values correspond to policy results of "grant", "deny", "conflict", and "undefined". We show here how policies in this language can be analyzed, and study the expressiveness of the language. To support policy analysis, we define a query language in which policy analysis questions can be phrased. Queries can be translated into a fragment of first-order logic for which satisfiability and validity checks are computable by SAT solvers or BDDs. We show how policy analysis can then be carried out through model checking, validity checking, and assume-guarantee reasoning over such translated queries. We also present static analysis methods for the particular questions of whether policies contain gaps or conflicts. Finally, we establish expressiveness results showing that all {em data independent} policies can be expressed in our policy language.
Keywords
Access control; Boolean functions; Computer security; Data structures; Database languages; Educational institutions; Libraries; Logic; Web services; Belnap logic; access control; policy analysis; policy languages;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Symposium, 2008. CSF '08. IEEE 21st
Conference_Location
Pittsburgh, PA, USA
ISSN
1940-1434
Print_ISBN
978-0-7695-3182-3
Type
conf
DOI
10.1109/CSF.2008.10
Filename
4556685
Link To Document