A Typed Language for Events

  • Sandra AlvesEmail author
  • Sabine Broda
  • Maribel Fernández
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9527)


We define a general typed language to deal with the notion of event in the context of access control systems. We distinguish between generic events, which represent the kind of actions that can occur in a system, and specific events, which represent actual occurrences of those kinds of actions. A relation is given associating specific to generic events, as well as a method for obtaining intervals from a history of events. We describe applications in access control systems with obligations.


Event Event type Access control Obligation Rewriting 


  1. 1.
    Alves, S., Degtyarev, A., Fernández, M.: Access control and obligations in the category-based metamodel: a rewrite-based semantics. In: Proietti, M., Seki, H. (eds.) LOPSTR 2014. LNCS, vol. 8981, pp. 148–163. Springer, Heidelberg (2015) Google Scholar
  2. 2.
    Baader, F., Nipkow, T.: Term rewriting and all that. Cambridge University Press, Great Britain (1998)CrossRefzbMATHGoogle Scholar
  3. 3.
    Barker, S.: Action-status access control. In: Proceedings of SACMAT 2007, pp. 195–204. ACM (2007)Google Scholar
  4. 4.
    Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of SACMAT 2009, pp. 187–196. ACM (2009)Google Scholar
  5. 5.
    Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inform. Syst. Secur. 12(1), 1:1–1:47 (2008)CrossRefGoogle Scholar
  6. 6.
    Bell, D.E., Lapadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical report ESD-TR-75-306, The MITRE Corporation (1976)Google Scholar
  7. 7.
    Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inform. Syst. Secur. 4(3), 191–233 (2001)CrossRefGoogle Scholar
  8. 8.
    Bertolissi, C., Fernández, M., Barker, S.: Dynamic event-based access control as term rewriting. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 195–210. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  9. 9.
    Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A.: Expressive policy analysis with enhanced system dynamicity. In: Proceedings of ASIACCS 2009, pp. 239–250. ACM (2009)Google Scholar
  10. 10.
    Davidson, D.: Essays on Actions and Events. Oxford University Press (2001)Google Scholar
  11. 11.
    Ferraiolo, D., Kuhn, R., Chandramouli, R.: Role-Based Access Control. Artech House, Norwood (2003) zbMATHGoogle Scholar
  12. 12.
    Gelfond, M., Lobo, J.: Authorization and obligation policies in dynamic systems. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 22–36. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  13. 13.
    Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531–546. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  14. 14.
    Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of CCS 2006, pp. 134–143. ACM (2006)Google Scholar
  15. 15.
    Kowalski, R.: Database updates in the event calculus. J. Logic Program. 12(1–2), 121–146 (1992)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Kowalski, R., Sadri, F.: A logic-based framework for reactive systems. In: Bikakis, A., Giurca, A. (eds.) RuleML 2012. LNCS, vol. 7438, pp. 1–15. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  17. 17.
    Kowalski, R., Sergot, M.: A Logic-based Calculus of Events. New Gen. Comput. 4(1), 67–95 (1986)CrossRefzbMATHGoogle Scholar
  18. 18.
    Miller, R., Shanahan, M.: The Event calculus in classical logic - alternative axiomatisations. Electron. Trans. Artif. Intell. 3(A), 77–105 (1999)MathSciNetGoogle Scholar
  19. 19.
    Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of SACMAT 2008, pp. 133–142. ACM (2008)Google Scholar
  20. 20.
    Ohori, A.: A polymorphic record calculus and its compilation. ACM Trans. Program. Lang. Syst. 17(6), 844–895 (1995)CrossRefGoogle Scholar
  21. 21.
    Pontual, M., Chowdhury, O., Winsborough, W.H., Yu, T., Irwin, K.: On the management of user obligations. In: Proceedings of SACMAT 2011, pp. 175–184. ACM (2011)Google Scholar
  22. 22.
    Ranise, S., Truong, A.T., Armando, A.: Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of SACMAT 2014, pp. 103–114 (2014)Google Scholar
  23. 23.
    Ranise, S., Truong, A.T., Viganò, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of SAC 2015, pp. 2177–2184 (2015)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Sandra Alves
    • 1
    Email author
  • Sabine Broda
    • 2
  • Maribel Fernández
    • 3
  1. 1.Faculty of Sciences, CRACS/INESCTECUniversity of PortoPortoPortugal
  2. 2.Faculty of Sciences, CMUPUniversity of PortoPortoPortugal
  3. 3.Department of InformaticsKing’s College LondonLondonUK

Personalised recommendations