SlideShare a Scribd company logo
1 of 27
Download to read offline
Representing Flexible Role-Based Access Control
Policies Using Objects and Defeasible Reasoning
Reza Basseda 1 Tiantian Gao 1 Michael Kifer 1
Steven Greenspan 2 Charley Chell 2
1Stony Brook University
2CA, Inc.
August 3, 2015
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 1 / 17
The Problem
Flexible Access Control
CA, Inc. wanted a resilient, customizable, maintainable access control
policy for managing its worldwide information resources
Customization to be done by security people, not programmers or
knowledge engineers
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
The Problem
Flexible Access Control
CA, Inc. wanted a resilient, customizable, maintainable access control
policy for managing its worldwide information resources
Customization to be done by security people, not programmers or
knowledge engineers
Rule systems are commonly used to specify access policies, but to
meet the requirements of customizability and maintainability we
identified three requirements:
Support for defeasible reasoning
Object-oriented features
Higher-order reasoning
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
The Problem
Flexible Access Control
CA, Inc. wanted a resilient, customizable, maintainable access control
policy for managing its worldwide information resources
Customization to be done by security people, not programmers or
knowledge engineers
Rule systems are commonly used to specify access policies, but to
meet the requirements of customizability and maintainability we
identified three requirements:
Support for defeasible reasoning
Object-oriented features
Higher-order reasoning
Flora-2: satisfies all three requirements
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
Defeasible Reasoning
What is defeasible reasoning?
A type of non-monotonic reasoning
Priorities over conclusions.
Conclusions can be defeated by other conclusion.
Example of an access control policy:
Typically, every student is authorized to use every device
Those who have abused a device before lose access to that device.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
Defeasible Reasoning
What is defeasible reasoning?
A type of non-monotonic reasoning
Priorities over conclusions.
Conclusions can be defeated by other conclusion.
Example of an access control policy:
Typically, every student is authorized to use every device
Those who have abused a device before lose access to that device.
John is a student and a printer is a device.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
Defeasible Reasoning
What is defeasible reasoning?
A type of non-monotonic reasoning
Priorities over conclusions.
Conclusions can be defeated by other conclusion.
Example of an access control policy:
Typically, every student is authorized to use every device
Those who have abused a device before lose access to that device.
John is a student and a printer is a device.
John is authorized to use a printer.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
Defeasible Reasoning
What is defeasible reasoning?
A type of non-monotonic reasoning
Priorities over conclusions.
Conclusions can be defeated by other conclusion.
Example of an access control policy:
Typically, every student is authorized to use every device
Those who have abused a device before lose access to that device.
John is a student and a printer is a device.
John is authorized to use a printer.
John has abused the printer.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
Defeasible Reasoning
What is defeasible reasoning?
A type of non-monotonic reasoning
Priorities over conclusions.
Conclusions can be defeated by other conclusion.
Example of an access control policy:
Typically, every student is authorized to use every device
Those who have abused a device before lose access to that device.
John is a student and a printer is a device.
John is authorized to use a printer.
John has abused the printer.
John is authorized to use a printer.
General non-monotonic reasoning frameworks:
Circumscription.
Default logic.
Autoepistemic logic.
Negation as failure (of different kinds)
Not designed for making changes modular.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
Defeasible Reasoning
Logic Programming with Defaults and Argumentation
Theories (LPDA)
Suitable theories come from the family of Defeasible Logics (Nute)
There are many different kinds. We use Logic Programming with
Defaults and Argumentation theories (LPDA).
Defaults, Exceptions with Prioritized rules, and Argumentation
Theories.
Easily adapts to frequent changes.
Itself is a family of logics that can be tailored to various needs.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 4 / 17
Defeasible Reasoning
LPDA
Strict Rules vs. Defeasible Rules
L : −Body. // strict
@r L : −Body // defeasible
Special predicates:
opposes.
Indicates which conclusions are incompatible with each other.
overrides.
Tells which rules have higher priorities.
Argumentation theory
Specifies the conditions under which incompatible conclusions defeat
each other.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 5 / 17
Defeasible Reasoning
Example
@{id1} authorized(?Principal,?Dev) :-
device(?Dev), principal(?Principal).
@{id2} neg authorized(?Principal,?Dev) :-
abused(?Principal,?Dev).
overrides(id2,id1).
opposes( authorized(?Principal,?Dev),
neg authorized(?Principal,?Dev) ).
principal(Mary).
principal(John).
device(printer).
abuse(John,printer).
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 6 / 17
Policies with Objects and Defeasible Rules
Using Classes and Objects
Classes: Represent different resources and roles used by policies.
Semantic integrity constraints.
Guide policy development.
Subclasses behavior overrides that of classes
Mechanism similar to defeasibility, but simpler and works at the
structural level.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 7 / 17
Policies with Objects and Defeasible Rules
Classes and Objects
Class Signatures in Flora-2
Person[|
firstName => string,
lastName => string
|].
Employee::Person[|
employmentYear => integer,
department => Department,
profession => string,
rank => Rank,
loc(?) => Location
|].
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 8 / 17
Policies with Objects and Defeasible Rules
Flexibility via Patching
Defeasible rules
Patching mechanism via defeasible reasoning:
Override default rules of a policy with new rules.
For instance, P might be a policy with a default rule
@r L :- Body.
Changing the policy by adding a more specific rule for certain cases:
@r L : −Body .
overrides(r , r) : −Cond.
opposes(L, L ).
When Cond holds, rule r is used instead of r.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 9 / 17
Policies with Objects and Defeasible Rules
Flexibility via Patching
Disable a rule
Another way: canceling a rule (instead of overriding).
cancel(r) : −Cond2.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 10 / 17
Policies with Objects and Defeasible Rules
Flexibility via Patching
Disable a rule
Another way: canceling a rule (instead of overriding).
cancel(r) : −Cond2.
Patching is local, modular, does not require expertise in logic — can
be done though high-level interface
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 10 / 17
Policies with Objects and Defeasible Rules
Policies using Monolithic Rules vs. Policies based on
Defeasible Rules
Monolithic rules vs. Defeasible rules
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
Policies with Objects and Defeasible Rules
Policies using Monolithic Rules vs. Policies based on
Defeasible Rules
Modifying old rules vs. Adding patch rules
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
Policies with Objects and Defeasible Rules
Policies using Monolithic Rules vs. Policies based on
Defeasible Rules
Modifying old rules vs. Adding patch rules
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
Policies with Objects and Defeasible Rules
Policies using Monolithic Rules vs. Policies based on
Defeasible Rules
More mangling the old rules vs. Patching modularly
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
Complex Example
More Complex Example
A policy that responds to queries of the form
?- grantAccess(?E, ?R, ?T, ?D)
where:
?E: Employee (Principal)
?R: Resource
?T: Time of Access
?D: Date of Access
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 12 / 17
Complex Example
More Complex Example
% Indicates that the employee ?E is allowed to access resource ?R
% at time ?T of day ?D.
@locAccess
grantAccess(?E,?R,?,?D) :-
?E:Employee[department-> ?DE],
?R:Resource[owner-> ?DE],
locRisk(?E,?D,?K), // estimates the risk (?K) of granting access to ?E on day ?D
?K < 3.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 13 / 17
Complex Example
More Complex Example
Required change: include the risk based on the time of access, if the
employee is away from the home department.
@{timeAccess}
neg grantAccess(?E,?R,?T,?D) :-
?E:Employee,
?R:Resource,
?E.department.location != ?E.loc(?D),
?E[timeWorked(?D) -> ?T],
timeRisk(?T,?K),
?K > 5.
overrides(timeAccess,locAccess).
timeRisk(?T,?TD) :- ?TD is abs(?T - 13).
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 14 / 17
Complex Example
More Complex Example
Another modification: Use employee’s local time rather than resource’s
// This rule says that the employee ?E can
// access resource ?R at time ?T on day ?D, if the access happens within
// the local normal working hours. Other than that, the conditions are the
// same as for rule locAccess.
@flexAccess
grantAccess(?E,?R,?T,?D) :-
?E[department-> ?DE],
?R[owner-> ?DE],
?E.loc(?D) != ?R.location,
timeRisk(?E,?T,?D,?TR), // assesses the risk (?TR) based on time of day
?TR < 5.
overrides(flexAccess,timeAccess).
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 15 / 17
Conclusion
Conclusion
Defeasible reasoning can yield significant benefits in the area of
role-based access control systems.
Complex modifications to access control policies can be naturally done
in a logic programming framework with defeasible reasoning.
Institutional hierarchies of policy makers and reflecting those
hierarchies in a policy — ditto.
Higher-order rules can represent parameterized policies, reducing the
number of rules (not discussed in the talk).
Future work:
Investigate more complex access control models
Deeper use of object-oriented features, higher-orderness.
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 16 / 17
Conclusion
Thank you
Questions?
Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 17 / 17

More Related Content

Similar to RuleML2015: Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning

ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slidestoolboc
 
Applied Observational Study.pptx
Applied Observational Study.pptxApplied Observational Study.pptx
Applied Observational Study.pptxMussieKebede3
 
Policy-compliant data processing: RDF-based restrictions for data-protection
Policy-compliant data processing: RDF-based restrictions for data-protectionPolicy-compliant data processing: RDF-based restrictions for data-protection
Policy-compliant data processing: RDF-based restrictions for data-protectionSven Lieber
 
Recommenders, Topics, and Text
Recommenders, Topics, and TextRecommenders, Topics, and Text
Recommenders, Topics, and TextNBER
 
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and RefinementGoal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and RefinementEmil Lupu
 
Invited Lecture on Interactive Information Retrieval
Invited Lecture on Interactive Information RetrievalInvited Lecture on Interactive Information Retrieval
Invited Lecture on Interactive Information RetrievalDavidMaxwell77
 
PMGT 699 KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docx
PMGT 699  KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docxPMGT 699  KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docx
PMGT 699 KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docxstilliegeorgiana
 
MontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsMontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsSven Lieber
 
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...YONG ZHENG
 
Nbe rtopicsandrecomvlecture1
Nbe rtopicsandrecomvlecture1Nbe rtopicsandrecomvlecture1
Nbe rtopicsandrecomvlecture1NBER
 
Reproducibility by Other Means: Transparent Research Objects
Reproducibility by Other Means: Transparent Research ObjectsReproducibility by Other Means: Transparent Research Objects
Reproducibility by Other Means: Transparent Research ObjectsTimothy McPhillips
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...PROIDEA
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...PROIDEA
 
2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...Ed Chi
 
Advances In Collaborative Filtering
Advances In Collaborative FilteringAdvances In Collaborative Filtering
Advances In Collaborative FilteringScott Donald
 

Similar to RuleML2015: Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning (20)

Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
Applied Observational Study.pptx
Applied Observational Study.pptxApplied Observational Study.pptx
Applied Observational Study.pptx
 
Policy-compliant data processing: RDF-based restrictions for data-protection
Policy-compliant data processing: RDF-based restrictions for data-protectionPolicy-compliant data processing: RDF-based restrictions for data-protection
Policy-compliant data processing: RDF-based restrictions for data-protection
 
3 classification
3  classification3  classification
3 classification
 
Recommenders, Topics, and Text
Recommenders, Topics, and TextRecommenders, Topics, and Text
Recommenders, Topics, and Text
 
De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and RefinementGoal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
 
Invited Lecture on Interactive Information Retrieval
Invited Lecture on Interactive Information RetrievalInvited Lecture on Interactive Information Retrieval
Invited Lecture on Interactive Information Retrieval
 
PMGT 699 KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docx
PMGT 699  KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docxPMGT 699  KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docx
PMGT 699 KA2 CAPSTONE REFLECTION PAPER ASSESSMENT RUBRICASSE.docx
 
MontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsMontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling Statistics
 
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
 
Nbe rtopicsandrecomvlecture1
Nbe rtopicsandrecomvlecture1Nbe rtopicsandrecomvlecture1
Nbe rtopicsandrecomvlecture1
 
Oop concepts
Oop conceptsOop concepts
Oop concepts
 
Reproducibility by Other Means: Transparent Research Objects
Reproducibility by Other Means: Transparent Research ObjectsReproducibility by Other Means: Transparent Research Objects
Reproducibility by Other Means: Transparent Research Objects
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
 
2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...
 
Lecture20
Lecture20Lecture20
Lecture20
 
Advances In Collaborative Filtering
Advances In Collaborative FilteringAdvances In Collaborative Filtering
Advances In Collaborative Filtering
 

More from RuleML

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsRuleML
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksRuleML
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...RuleML
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML
 
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...RuleML
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRuleML
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML
 
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...RuleML
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...RuleML
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-RuleML
 
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...RuleML
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML
 

More from RuleML (20)

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and Solutions
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasks
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
 
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?
 
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
 
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function SymbolsRuleML2015: Binary Frontier-guarded ASP with Function Symbols
RuleML2015: Binary Frontier-guarded ASP with Function Symbols
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
 

Recently uploaded

Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Creating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsCreating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsNurulAfiqah307317
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxRizalinePalanog2
 

Recently uploaded (20)

Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Creating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsCreating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening Designs
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 

RuleML2015: Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning

  • 1. Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning Reza Basseda 1 Tiantian Gao 1 Michael Kifer 1 Steven Greenspan 2 Charley Chell 2 1Stony Brook University 2CA, Inc. August 3, 2015 Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 1 / 17
  • 2. The Problem Flexible Access Control CA, Inc. wanted a resilient, customizable, maintainable access control policy for managing its worldwide information resources Customization to be done by security people, not programmers or knowledge engineers Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
  • 3. The Problem Flexible Access Control CA, Inc. wanted a resilient, customizable, maintainable access control policy for managing its worldwide information resources Customization to be done by security people, not programmers or knowledge engineers Rule systems are commonly used to specify access policies, but to meet the requirements of customizability and maintainability we identified three requirements: Support for defeasible reasoning Object-oriented features Higher-order reasoning Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
  • 4. The Problem Flexible Access Control CA, Inc. wanted a resilient, customizable, maintainable access control policy for managing its worldwide information resources Customization to be done by security people, not programmers or knowledge engineers Rule systems are commonly used to specify access policies, but to meet the requirements of customizability and maintainability we identified three requirements: Support for defeasible reasoning Object-oriented features Higher-order reasoning Flora-2: satisfies all three requirements Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 2 / 17
  • 5. Defeasible Reasoning What is defeasible reasoning? A type of non-monotonic reasoning Priorities over conclusions. Conclusions can be defeated by other conclusion. Example of an access control policy: Typically, every student is authorized to use every device Those who have abused a device before lose access to that device. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
  • 6. Defeasible Reasoning What is defeasible reasoning? A type of non-monotonic reasoning Priorities over conclusions. Conclusions can be defeated by other conclusion. Example of an access control policy: Typically, every student is authorized to use every device Those who have abused a device before lose access to that device. John is a student and a printer is a device. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
  • 7. Defeasible Reasoning What is defeasible reasoning? A type of non-monotonic reasoning Priorities over conclusions. Conclusions can be defeated by other conclusion. Example of an access control policy: Typically, every student is authorized to use every device Those who have abused a device before lose access to that device. John is a student and a printer is a device. John is authorized to use a printer. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
  • 8. Defeasible Reasoning What is defeasible reasoning? A type of non-monotonic reasoning Priorities over conclusions. Conclusions can be defeated by other conclusion. Example of an access control policy: Typically, every student is authorized to use every device Those who have abused a device before lose access to that device. John is a student and a printer is a device. John is authorized to use a printer. John has abused the printer. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
  • 9. Defeasible Reasoning What is defeasible reasoning? A type of non-monotonic reasoning Priorities over conclusions. Conclusions can be defeated by other conclusion. Example of an access control policy: Typically, every student is authorized to use every device Those who have abused a device before lose access to that device. John is a student and a printer is a device. John is authorized to use a printer. John has abused the printer. John is authorized to use a printer. General non-monotonic reasoning frameworks: Circumscription. Default logic. Autoepistemic logic. Negation as failure (of different kinds) Not designed for making changes modular. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 3 / 17
  • 10. Defeasible Reasoning Logic Programming with Defaults and Argumentation Theories (LPDA) Suitable theories come from the family of Defeasible Logics (Nute) There are many different kinds. We use Logic Programming with Defaults and Argumentation theories (LPDA). Defaults, Exceptions with Prioritized rules, and Argumentation Theories. Easily adapts to frequent changes. Itself is a family of logics that can be tailored to various needs. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 4 / 17
  • 11. Defeasible Reasoning LPDA Strict Rules vs. Defeasible Rules L : −Body. // strict @r L : −Body // defeasible Special predicates: opposes. Indicates which conclusions are incompatible with each other. overrides. Tells which rules have higher priorities. Argumentation theory Specifies the conditions under which incompatible conclusions defeat each other. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 5 / 17
  • 12. Defeasible Reasoning Example @{id1} authorized(?Principal,?Dev) :- device(?Dev), principal(?Principal). @{id2} neg authorized(?Principal,?Dev) :- abused(?Principal,?Dev). overrides(id2,id1). opposes( authorized(?Principal,?Dev), neg authorized(?Principal,?Dev) ). principal(Mary). principal(John). device(printer). abuse(John,printer). Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 6 / 17
  • 13. Policies with Objects and Defeasible Rules Using Classes and Objects Classes: Represent different resources and roles used by policies. Semantic integrity constraints. Guide policy development. Subclasses behavior overrides that of classes Mechanism similar to defeasibility, but simpler and works at the structural level. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 7 / 17
  • 14. Policies with Objects and Defeasible Rules Classes and Objects Class Signatures in Flora-2 Person[| firstName => string, lastName => string |]. Employee::Person[| employmentYear => integer, department => Department, profession => string, rank => Rank, loc(?) => Location |]. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 8 / 17
  • 15. Policies with Objects and Defeasible Rules Flexibility via Patching Defeasible rules Patching mechanism via defeasible reasoning: Override default rules of a policy with new rules. For instance, P might be a policy with a default rule @r L :- Body. Changing the policy by adding a more specific rule for certain cases: @r L : −Body . overrides(r , r) : −Cond. opposes(L, L ). When Cond holds, rule r is used instead of r. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 9 / 17
  • 16. Policies with Objects and Defeasible Rules Flexibility via Patching Disable a rule Another way: canceling a rule (instead of overriding). cancel(r) : −Cond2. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 10 / 17
  • 17. Policies with Objects and Defeasible Rules Flexibility via Patching Disable a rule Another way: canceling a rule (instead of overriding). cancel(r) : −Cond2. Patching is local, modular, does not require expertise in logic — can be done though high-level interface Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 10 / 17
  • 18. Policies with Objects and Defeasible Rules Policies using Monolithic Rules vs. Policies based on Defeasible Rules Monolithic rules vs. Defeasible rules Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
  • 19. Policies with Objects and Defeasible Rules Policies using Monolithic Rules vs. Policies based on Defeasible Rules Modifying old rules vs. Adding patch rules Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
  • 20. Policies with Objects and Defeasible Rules Policies using Monolithic Rules vs. Policies based on Defeasible Rules Modifying old rules vs. Adding patch rules Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
  • 21. Policies with Objects and Defeasible Rules Policies using Monolithic Rules vs. Policies based on Defeasible Rules More mangling the old rules vs. Patching modularly Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 11 / 17
  • 22. Complex Example More Complex Example A policy that responds to queries of the form ?- grantAccess(?E, ?R, ?T, ?D) where: ?E: Employee (Principal) ?R: Resource ?T: Time of Access ?D: Date of Access Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 12 / 17
  • 23. Complex Example More Complex Example % Indicates that the employee ?E is allowed to access resource ?R % at time ?T of day ?D. @locAccess grantAccess(?E,?R,?,?D) :- ?E:Employee[department-> ?DE], ?R:Resource[owner-> ?DE], locRisk(?E,?D,?K), // estimates the risk (?K) of granting access to ?E on day ?D ?K < 3. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 13 / 17
  • 24. Complex Example More Complex Example Required change: include the risk based on the time of access, if the employee is away from the home department. @{timeAccess} neg grantAccess(?E,?R,?T,?D) :- ?E:Employee, ?R:Resource, ?E.department.location != ?E.loc(?D), ?E[timeWorked(?D) -> ?T], timeRisk(?T,?K), ?K > 5. overrides(timeAccess,locAccess). timeRisk(?T,?TD) :- ?TD is abs(?T - 13). Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 14 / 17
  • 25. Complex Example More Complex Example Another modification: Use employee’s local time rather than resource’s // This rule says that the employee ?E can // access resource ?R at time ?T on day ?D, if the access happens within // the local normal working hours. Other than that, the conditions are the // same as for rule locAccess. @flexAccess grantAccess(?E,?R,?T,?D) :- ?E[department-> ?DE], ?R[owner-> ?DE], ?E.loc(?D) != ?R.location, timeRisk(?E,?T,?D,?TR), // assesses the risk (?TR) based on time of day ?TR < 5. overrides(flexAccess,timeAccess). Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 15 / 17
  • 26. Conclusion Conclusion Defeasible reasoning can yield significant benefits in the area of role-based access control systems. Complex modifications to access control policies can be naturally done in a logic programming framework with defeasible reasoning. Institutional hierarchies of policy makers and reflecting those hierarchies in a policy — ditto. Higher-order rules can represent parameterized policies, reducing the number of rules (not discussed in the talk). Future work: Investigate more complex access control models Deeper use of object-oriented features, higher-orderness. Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 16 / 17
  • 27. Conclusion Thank you Questions? Michael Kifer (Stony Brook University) RBAC Using Objects and Defeasibility RuleML 2015 17 / 17