Advertisement

Distributed Access Control: A Logic-Based Approach

  • Steve Barker
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)

Abstract

We introduce the status-based access control model, and we describe status-based access control policies and programs. Some technical results are presented, and we describe a practical implementation of an autonomous agent that is used for evaluating access request with respect to a formulation of an SBAC policy.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards a Unified Standard. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 47–61 (2000)Google Scholar
  2. 2.
    Barker, S.: Protecting Deductive Databases from Unauthorized Retrievals. In: DBSec 2000, pp. 301–311. Kluwer, Dordrecht (2000)Google Scholar
  3. 3.
    Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.S.: Flexible Support for Multiple Access Control Policies. ACM TODS 26(2), 214–260 (2001)zbMATHCrossRefGoogle Scholar
  4. 4.
    Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A System to Specify and Manage Multipolicy Access Control Models. In: Proc. POLICY 2002, pp. 116–127. IEEE Computer Society, Los Alamitos (2002)Google Scholar
  5. 5.
    Barker, S., Stuckey, P.: Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Trans. on Information and System Security (to appear)Google Scholar
  6. 6.
    Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. In: Proc. 5th ACM Workshop on Role-Based Access Control, pp. 21–30 (2000)Google Scholar
  7. 7.
    Barker, S.: Temporal Authorization in the Simplified Event Calculus. In: DBSec 1999, pp. 271–284 (1999)Google Scholar
  8. 8.
    Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–38. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Barker, S.: Status-based Access Control (to appear)Google Scholar
  10. 10.
    Przymusinski, T.: On the Declarative Semantics of Deductive Databases and Logic Programming. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 193–216. Morgan-Kaufmann, San Francisco (1988)Google Scholar
  11. 11.
    Clark, K.: Negation as Failure. In: Gallaire, H., Minker, J. (eds.) Logic and Databases, pp. 293–322. Plenum, New York (1978)Google Scholar
  12. 12.
    van Gelder, A., Ross, K., Schlipf, J.: The Well-Founded Semantics for General Logic Programs. JACM 8, 620–650 (1991)Google Scholar
  13. 13.
    CGIHTML. The CGIHTML package, http://www.eekim.com/software/cgihtml/
  14. 14.
    Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P.: The XSB System Version 2.0. In: Programmer’s Manual (1999)Google Scholar
  15. 15.
    Barker, S.: Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol. 2401, pp. 54–69. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Steve Barker
    • 1
  1. 1.Dept. Computer ScienceKing’s CollegeLondonUK

Personalised recommendations