Model-checking access control policies

Dimitar Guelev, Mark Ryan, Pierre-Yves Schobbens

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Abstract

We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe systems which avoid the root-bottleneck problem. We present a language for describing goals of agents; these goals are typically to read or write the values of some resources. We describe a decision procedure which determines whether a given coalition of agents has the means (possibly indirectly) to achieve its goal. We argue that this question is decidable in the situation of the potential intruders acting in parallel with legitimate users and taking whatever temporary opportunities the actions of the legitimate users present. Our technique can also be used to synthesise finite access control systems, from an appropriately formulated logical theory describing a high-level policy.
Original languageEnglish
Title of host publicationInformation Security
Subtitle of host publicationISC 2004
EditorsK. Zhang, Y. Zheng
Place of PublicationBerlin
PublisherSpringer
Pages219-230
Number of pages12
ISBN (Electronic)978-3-540-30144-8
ISBN (Print)978-3-540-23208-7
DOIs
Publication statusPublished - 2004

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume3225

Fingerprint

Dive into the research topics of 'Model-checking access control policies'. Together they form a unique fingerprint.

Cite this