skip to main content
10.1145/2070425.2070441acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Logic based authorization program and its implementation

Published:14 November 2011Publication History

ABSTRACT

In this paper, we describe a logic based authorization program and its implementation. Weighted Delegatable Authorization Program (WDAP) is a logic based framework supporting weighted authorizations and weighted administrative privilege delegations in a decentralised access control system. In this paper we describe various aspects about WDAP and show how it can be used to specify complex security policies. The access control policy is also given. The program Smodels is a widely used system that implements the answer set semantics for extended logic programs. We show how to use Smodels to implement WDAP.

References

  1. M.Abadi, M.Burrows, B.Lampson, G.Plotkin, A calculus for access control in distributed systems. ACM Trans. on programming languages and systems, 15(4):706--734, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Barka and R. Sandhu, Framework for role-based delegation models. Proceedings of 16th Annual Computer Security Applications Conference, pp 168--176, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Bertino, F.buccafurri, E.Ferrari, P.Rullo, A logical framework for reasoning on data access control policies. proceedings of the 12th IEEE Computer Society Foundations Workshop, IEEE Computer Society Press, Los Alamitos, 1999, pp.175--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M.Gelfond and V.Lifschitz, The stable model semantics for logic programming. Proc.5th Int. Conf. on Logic Programming, MIT Press. pp.1070--1080, 1988.Google ScholarGoogle Scholar
  5. M.Gelfond and V.Lifschitz, Classical negation in logic programs and disjunctive databases. New Generation Computing, 9:pp365--385, 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jajodia, P. Samarati, and V.S. Subrahmanian, A logical language for expressing authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp 31--42, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Li, B.N. Grosof, and J. Feigenbaum, Delegation Logic: A Logic-based approach to distributed authorization. ACM Transactions on Information and Systems Security, 6(1): 128--171 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Ruan and V. Varadharajan, Reasoning on weighted delegatable authorizations. Proceedings of the 20th International Conference on Database and Expert Systems Applications. Springer Lecture Notes in Computer Science 5690, pp 279--286, 2009. ISSN 0302--9743. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Ruan and V. Varadharajan, A weighted graph approach to authorization delegation and conflict resolution. In Proc. of the 9th Australasian Conference on Information Security and Privacy, pp 402--413, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Schaad. Conflict detection in a role-based delegation model. Proceedings of Annual Computer Security Applications Conference, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A.Van Gelder, K, Ross and J. S. Schlipf, Unfounded sets and well-founded semantics for general logic programs. Proc. Seventh Symp. on Principles of Database Systems, 1988,221--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Woo and S. Lam, Authorization in distributed systems: a formal approach. Proceedings of IEEE on Research in Security and Privacy, pp33--50,1992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. X. Zhang, S. Oh, and R. Sandhu, PBDM: A flexible delegation model in RBAC. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Logic based authorization program and its implementation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '11: Proceedings of the 4th international conference on Security of information and networks
      November 2011
      276 pages
      ISBN:9781450310208
      DOI:10.1145/2070425

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader