Proceedings of the 12th IEEE Computer Security Foundations Workshop
DOI: 10.1109/csfw.1999.779772
|View full text |Cite
|
Sign up to set email alerts
|

A logical framework for reasoning on data access control policies

Abstract: In this paper we propose a logic formalism that naturally supports the encoding of complex security specifications. This formalism relies on a hierarchically structured domain made of subjects, objects and privileges.Authorizations are expressed by logic rules. The formalism supports both negation by failure (possibly unstratified) and true negation. The latter is used to express negative authorizations. It turns out that conflicts may result from a set of authorization rules. Dealing with such conflicts requi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(34 citation statements)
references
References 19 publications
(25 reference statements)
0
34
0
Order By: Relevance
“…Conflicts between policy modules entered by different administrators can be detected by automated methods [44,7,36] that can be built into policy management tools. At the same time, because FSL policies are used by real systems [14,26,52], any conflicts that are not resolved by administrative tools must be resolved automatically at enforcement time [53,36,12,10,24,27,48,11]. Unlike prior languages, FSL conflict resolution is complicated by the fact that policies can reference external sources [48,13,41], which can change independent of the policy.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Conflicts between policy modules entered by different administrators can be detected by automated methods [44,7,36] that can be built into policy management tools. At the same time, because FSL policies are used by real systems [14,26,52], any conflicts that are not resolved by administrative tools must be resolved automatically at enforcement time [53,36,12,10,24,27,48,11]. Unlike prior languages, FSL conflict resolution is complicated by the fact that policies can reference external sources [48,13,41], which can change independent of the policy.…”
Section: Related Workmentioning
confidence: 99%
“…Because disagreements naturally arise among administrators, FSL was designed so that those disagreements would manifest as conflicts in policies [53,36,12,10,24,27,48,11,7]. Conflicts between policy modules entered by different administrators can be detected by automated methods [44,7,36] that can be built into policy management tools.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A variety of policy languages and models have been proposed. Some of them are generic [1,14,25,26,37] while others are designed for specific applications [7,11,36,38] or data models [8,9,19,29].…”
Section: Related Workmentioning
confidence: 99%
“…Some authors regard multiple models as an opportunity to write nondeterministic specifications where each model is an acceptable policy and the system makes an automatic choice between the available alternatives [34]. For instance, the models of a policy may correspond to all possible ways of assigning permissions that preserve a Chinese Wall policy [35].…”
Section: Rule-based Policy Representationmentioning
confidence: 99%