A logic for state transformations in authorization policies

Yun Bai, Vijay Varadharajan

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

In a multi-user information-sharing system, an authorization policy provides the ability to limit and control access to system, applications and information. In the real world, an authorization policy has temporal properties. That is, it needs to be updated to capture the changing requirements of applications, systems and users. These updates are implemented via transformations of the authorization policies. In this paper, we propose a logic-based approach to specify and to reason about state transformations in authorization policies. An authorization policy is specified using a policy base which comprises a finite set of facts and access constraints. We define the structure of the policy transformation and employ a model-based semantics to perform the transformation under the principle of minimal change. Furthermore, we extend the model-based semantics by introducing preference ordering to resolve possible conflicts during the transformation of policies. We also discuss the implementation of the model-based transformation approach and outline the relevant algorithms.

Original languageEnglish
Title of host publicationProceedings - 10th Computer Security Foundations Workshop, CSFW 1997
PublisherIEEE Computer Society
Pages173-182
Number of pages10
ISBN (Electronic)0818679905
DOIs
Publication statusPublished - 1997
Event10th IEEE Computer Security Foundations Workshop, CSFW 1997 - Rockport, United States
Duration: 10 Jun 199712 Jun 1997

Publication series

NameProceedings - IEEE Computer Security Foundations Symposium
ISSN (Print)1940-1434

Conference

Conference10th IEEE Computer Security Foundations Workshop, CSFW 1997
Country/TerritoryUnited States
CityRockport
Period10/06/9712/06/97

Bibliographical note

Publisher Copyright:
© 1997 IEEE.

Fingerprint

Dive into the research topics of 'A logic for state transformations in authorization policies'. Together they form a unique fingerprint.

Cite this