• DocumentCode
    1642579
  • Title

    Constraining Credential Usage in Logic-Based Access Control

  • Author

    Bauer, Lujo ; Jia, Limin ; Sharma, Divya

  • Author_Institution
    Carnegie Mellon Univ., Pittsburgh, PA, USA
  • fYear
    2010
  • Firstpage
    154
  • Lastpage
    168
  • Abstract
    Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the consequences of these policies are derived using logical inference rules. Proofs in authorization logics can serve as capabilities for gaining access to resources. Because a proof is derived from a set of credentials possibly issued by different parties, the issuer of a specific credential may not be aware of all the proofs that her credential may make possible. From this credential issuer´s standpoint, the policy expressed in her credential may thus have unexpected consequences. To solve this general problem, we propose a system in which credentials can specify constraints on how they are to be used. We show how to modularly extend wellstudied authorization logics to support the specification and enforcement of such constraints. A novelty of our design is that we allow the constraints to be arbitrary well-behaved functions over authorization proofs. Since all the information about an access is contained in the proofs, this makes it possible to express many interesting constraints. We study the formal properties of such a system, and give examples of constraints.
  • Keywords
    authorisation; constraint handling; formal specification; inference mechanisms; authorization logic; authorization proof; credential usage constraint; flexible access control policy; logic based access control; logical inference rules; Authorization; Context; Electronic mail; Libraries; Limiting; Wireless networks; Access control; Computer security; Formal languages; Logic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Symposium (CSF), 2010 23rd IEEE
  • Conference_Location
    Edinburgh
  • ISSN
    1940-1434
  • Print_ISBN
    978-1-4244-7510-0
  • Electronic_ISBN
    1940-1434
  • Type

    conf

  • DOI
    10.1109/CSF.2010.18
  • Filename
    5552648