A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of the policy enforced by the system. While this may be trivial for some requirements, specification of other requirements may become quite complex or even impossible. The reason for this is that a single policy simply cannot capture different protection requirements users may need to enforce on different data. In this paper we take a first step towards a model able to support different access control policies. We propose a logical language for the specification of authorizations on which such a model can be based. The language allows users to specify, together with the authorizations, the policy according to which access control decisions are to be made. Policies are expressed by means of rules which enforce derivation of authorizations, conflict resolution, access control, and integrity constraint checking. We illustrate the power of our language by showing how different constraints that are sometimes required, but very seldom supported by existing access control systems, can be represented in our language.

A Logical Language for Expressing Authorizations / S. Jajodia, P. Samarati, V.S. Subramanian - In: Proc. of the 1997 IEEE Symposium on Security and Privacy[s.l] : IEEE, 1997. - ISBN 0-8186-7828-3. - pp. 31-42 (( convegno 1997 IEEE Symposium on Security and Privacy tenutosi a Oakland, CA, USA nel 1997.

A Logical Language for Expressing Authorizations

P. Samarati
Secondo
;
1997

Abstract

A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of the policy enforced by the system. While this may be trivial for some requirements, specification of other requirements may become quite complex or even impossible. The reason for this is that a single policy simply cannot capture different protection requirements users may need to enforce on different data. In this paper we take a first step towards a model able to support different access control policies. We propose a logical language for the specification of authorizations on which such a model can be based. The language allows users to specify, together with the authorizations, the policy according to which access control decisions are to be made. Policies are expressed by means of rules which enforce derivation of authorizations, conflict resolution, access control, and integrity constraint checking. We illustrate the power of our language by showing how different constraints that are sometimes required, but very seldom supported by existing access control systems, can be represented in our language.
Settore INF/01 - Informatica
1997
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/192354
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 338
  • ???jsp.display-item.citation.isi??? 158
social impact