Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516667
|View full text |Cite
|
Sign up to set email alerts
|

Belief semantics of authorization logic

Abstract: Authorization logics have been used in the theory of computer security to reason about access control decisions. In this work, a formal belief semantics for authorization logics is given. The belief semantics is proved to subsume a standard Kripke semantics. The belief semantics yields a direct representation of principals' beliefs, without resorting to the technical machinery used in Kripke semantics. A proof system is given for the logic; that system is proved sound with respect to the belief and Kripke sema… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 50 publications
0
5
0
Order By: Relevance
“…Such chains of delegation are often considered in authorisation logics (see e.g. Abadi's survey (Abadi 2003)), but rarely given a formal semantics (Hirsch and Clarkson 2013), let alone one that can be applied in a setting as general as causal models.…”
Section: Examples Of Causal Securitymentioning
confidence: 99%
“…Such chains of delegation are often considered in authorisation logics (see e.g. Abadi's survey (Abadi 2003)), but rarely given a formal semantics (Hirsch and Clarkson 2013), let alone one that can be applied in a setting as general as causal models.…”
Section: Examples Of Causal Securitymentioning
confidence: 99%
“…These reasoning principles could be expanded and used in other logics. For instance, using the tools developed in Section 6, we should be able to give non-interference proofs for logics like NAL [SWS11] and FOCAL [HC13] which reason about implication and disjunction. We should also be able to add disjunction and implication to logics like DCC [Aba06, ABHR99] while still providing a non-interference theorem.…”
Section: Future Workmentioning
confidence: 99%
“…This line of work, which inspired our formulation of the belief-vulnerability, is based on the KullbackLeibler distance, a concept related to Shannon entropy which in general, as already mentioned in Section 3, fails to characterize many realistic attacks scenarios. Belief semantics has been explored also in the context of other security properties in [39,40]. In a recent paper [41], Hussein proposed a generalization of the Bayesian-based framework of [22] based on DempsterShafer theory.…”
Section: Related Workmentioning
confidence: 99%