SlideShare a Scribd company logo
Constructive Access
Control:
Revisited?

Valeria de Paiva
Intelligent Systems Lab
PARC

(Joint work with Jessica Staddon, CSL)
Outline

   Motivation: access control must be logic…
   Background
   Basic framework
   A new system?
   Discussion & applications

    Caveat: no expert, a talk to logicians interested in the
    problem…


11/09/09
Why the buzz about access control?
   Ubiquity of computing and growth of the Internet turned
    Information Security into a central area of research in
    computer science.
   Many areas within Information Security. For logicians
    there’s considerable work on logical methods for access
    control.
   For example:
     – Abadi et al, 1993, Abadi, 2003, Abadi 2006
     – Garg et al, 2006
     – Garg, Pfenning 2006
     – Garg, Abadi, 2008
           » Thanks Martin and Deepak!

    11/09/09
Access control in current practice
                   (according to Abadi)
   Access control is pervasive
     –     applications
     –     virtual machines
     –     operating systems
     –     firewalls
     –     doors
     –     …
   Access control seems difficult to get right.
   Distributed systems make it harder.

11/09/09
What is Access Control?
   In computer security, access control consists in
    deciding whether an agent that requests some action
    should have his request granted or not.
   Decisions are based on access control policies, the
    combination of several policies at different layers and
    from different entities.
   A single policy may be easy to understand e.g. user
    Valeria may want to delete file1 and if she owns
    the file the admin should allow it.
   But the consequences of even a single policy can
    get complicated, when there are many principals,
    many roles, many resources, delegation, revocation,
    etc.


11/09/09
The access control model

 Elements:
     –     Resources
     –     Requests
     –     Sources for requests, called principals
     –     A reference monitor to decide on requests
     –     Control policies


                Dr
                of ee
                  R
                  e
                  e
                  e j
                  nc
             Po m b
             iaa o O
             rl p
             n e
             c r
              i
              p t
                i
                oi
                 nt
                  n
                  or
                     c
                     t

             S e Gs
             o q ue
             u u a o
             r R
             c e rR
             e s du
                t  r
                   c
                   e

11/09/09
General theories and systems

   Over the years, there have been many
    theories and systems for access control.
     –     Logics
     –     Languages
     –     Infrastructures (e.g., PKIs)
     –     Architectures
   They aim to explain, organize, and unify
    access control.
   We’re interested in logics and languages…

11/09/09
Access Control needs logic?

  “Although access control may sometimes seem
   conceptually straightforward, it is both complex and
   error-prone in practice. […] One may hope that logic
   would provide a simple, solid, and general foundation
   for access control, as well as methods for designing,
   implementing, and validating particular access control
   mechanisms. In fact, although logic is not a panacea,
   its applications in access control have been
   substantial and beneficial.” M. Abadi, Invited
   Address, LICS 2003



11/09/09
Access control needs logic

   We need to combine access control policies,
    have groups of principals, revocation,
    delegation, roles, etc.
   Things can get very complicated. There can
    be gaps, inconsistencies, ambiguity,
    loopholes, obscurity.
   Systems can be easy to break and security is
    endangered.


11/09/09
On the other hand…

(Constructive) Logic can:
 Express policies
     – Admin says
           owns (Valeria, file) -> may_delete(Valeria, file)
   Express authorization questions
     – Does Valeria have a proof of the proposition
           Admin says may_delete(Valeria, file)?
   Logical proofs allow us:
     – Construct evidence (assemble proof)
     – Verify evidence (verify proof)
     – Reason from assumptions (given credentials)
11/09/09
Logics for Access Control
   Encode and reason within policies
   Analyze policies (reason about them)
     – Express (and reason about) private knowledge?
   Prove properties of policies, check for unintended
    consequences. Enforce policies?
   Proofs hard to construct, easy to verify
     – Lead to Proof Carrying Authorization
       Appel&Felten, Bauer
     PCA insight :
    the user/ principal wanting access must construct a
    proof, the server will simply check the proof to
    grant access
           uses higher-order logic, can we make it simpler?

11/09/09
Logics of Access Control

   Several systems proposed and studied.
   Traditionally classical modal logics with extra
    constructs (Abadi et al 1993)
   Garg&Pfenning(2006) have proposed a constructive
    lax logic of access control, non-interference
   Abadi (2006) has proposed a lax logic based system
    DCC, non-interference
   Garg et al(2006) have proposed a “linear” logic for
    access control, credentials are resources
   Garg&Abadi(2008 to appear) have four systems
    based on lax logic
11/09/09
Background1: Principals

   A principal is any user, machine, program,
    organization that
     – Either makes requests, or
     – Makes statements (policies)
    Examples:
     –     Humans: Alice, Bob, Charlie, ...
     –     Users: 500, 501, admin, ...
     –     Programs: MSWord, Acrobat Reader, ...
     –     Organizations: CMU, SRI, ACM, Wells-Fargo...
     –     Public keys: 0xaf5436, 0x123458
11/09/09
Background2: “A says s”

Taking Garg&Abadi (GA08) as basic reference
 Basic construct operator “says”: applied to principal A
  and formula s, “A says s”.
     - Abstracts away from implementation concerns
   “A says s” means intuitively that A asserts or supports
    s, e.g. “A says delete-file1”.
   Different access control logics have subtly different
    meanings for “says”.
   Note similarity to “K attests A” in cyberlogic, where K
    is (has to be?) a public key, A is a formula


11/09/09
Background3: “speaks for”

   Operator “speaks for”, applied to principals A and B,
     A => B
   This is read “A speaks for B” and intuitively means
    that if A says s then B says s, for all s.
   In particular if KAlice is the public key for Alice we
    have KAlice => Alice.
      also if S a server then S => Alice, if S is acting for Alice
   Different access control logics have subtly different
    meanings for “speaks for”
   Not fine-grained enough?
   (Similar to cyberlogic’s delegation?)
11/09/09
Which logic of access control?

   Intuitionistic basis, as we want
     – a Curry-Howard isomorphism,
     – evidence instead of truth
     – use proofs as witnesses for PCA
   Have a collection of principals A, B,..
   How do we represent logically the constructs
    for access control?
   All recent work mentioned uses an indexed
    collection of lax modalities

11/09/09
What’s a lax modality?
   A modality is an unary operator acting on
    propositions
   Curry(1952) a possibility modality that half-behaves
    like a necessity one.
   Like possibility, twice the modality implies it once.
    But like necessity as it satisfies distribution over
    implication.
    Also known as computational logic, CL,
      (Benton, Bierman, de Paiva, JFP 1998)
   Properties:
           s  A says s
           A says A says s  A says s
           A says (st)  (A says s)  (A says t)

11/09/09
Why lax modalities?

 Need to model “A says s”
 “says” has some characteristics of possibility:

 if “A says (A says s)” then “A says s”,
 if “A says (s->t)” then “A says s-> A says t”
 Lax modalities buy you non-interference (Abadi06,
  GargPfenning06)
 Lax modalities buy you “hand-off axiom”: if A says
  that B speaks for A then B does speak for A
  (Abadi06)
 Lax modality well-understood logic type theory


11/09/09
How to do lax modalities?

   Different proof systems: Moggi89,de Paiva et
    al 98, Mendler&Fairtlough97
   Garg&Pfenning: ‘judgemental’ logic (2001)
   Based on Martin-Loeuf’s ideas: intro and elim
    rules plus cut elim are the meaning of
    connectives
   Works for S4-style connectives, dual-sized
    sequents (e.g. linear logic exponentials)
   Can we do less powerful/less symmetric
    modalities?

11/09/09
Why not lax modalities?

   Axiom (s -> A says s) means every principal
    says s, if s is true
     – Difficult to believe that principals are that ideal
   Similarly, “speaks for” too strong
   Alice would like to make sure that Bob
    speaks for her in certain circumstances, not
    for all s.
   Maybe can use a simple K constructive
    modality for “says”…

11/09/09
A new system?

   Caveat: work not really done…
   But Curry-Howard Iso for Basic Modal Logic,
    (Bellin, de Paiva, Ritter, 2001)
   Bug in published version, being corrected and
    extended now
     – Thanks to Kakutani (2006) for correcting it!
   Type theory, semantics in place:
     – Normalization, subject reduction,
       soundness&completeness, internal language too
   Non-interference works too, “hand off”?

11/09/09
Extensions

   Garg: linear logic to deal with credentials that
    are consumable resources
     – Apparently proof-theory done, implementation is
       the problem
     – Garg et al 06, Bauer et al 06
   Garg et al: temporal aspects of security in the
    works
     – I also want my versions with and without linear
       basis
     – Constructive temporal logics in the market not
       good

11/09/09
Applications?
   A bit of unifying glee: 1995 proposal on logics
    of authentication
   PCA for less expressive logics
     – Grey project at CMU interesting, but it would be
       nice if it could be simpler, Manifest Security?
   Access control for multiple enterprise
    repositories:
     – What if our principals were the parties that need to
       cooperate when someone is buying a house?
     – Can our access control theories help out?
     – Some Stanford/PORTIA work on this direction


    11/09/09
Conclusion

   Logic clearly useful for access control
   Multiple applications and opportunities
   More work required on trade-offs between
    logical systems, automation, etc
   Innovative applications may send the
    formalism into totally different directions




11/09/09
Thank you

Questions?


11/09/09
References

   Manifest Security for Distributed
    Information Karl Crary, Robert Harper, Frank
    Pfenning 2006
   Garg&Abadi08, Garg&Pfenning06, Garg et al
    06
   PCA Appel&Felten 99, Bauer’s thesis 03




11/09/09
A calculus for access control
[Abadi, Burrows, Lampson, and Plotkin, 1993]


   A simple notation for assertions
    – A says s
    – A speaks for B (sometimes written A ⇒ B)


   With logical rules
      – ⊢ A says (s → t) → (A says s) → (A says t)
      – If ⊢ s then ⊢ A says s.
      – ⊢ A speaks for B → (A says s) → (B says s)
      – ⊢ A speaks for A
      – ⊢ A speaks for B ∧ B speaks for C → A speaks for
11/09/09 C
Enforcing policies?

   An access control policy can be presented as
    a logical theory in an access control logic
   A principal is granted access to a resource if
    there is a formal proof that the principal is
    authorized the use of the resource according
    to the accepted policy
   Constructivity buys you PCA?




11/09/09

More Related Content

Viewers also liked

2007 iPres Beijing - MIXED: Preservation by migration to XML
2007 iPres Beijing - MIXED: Preservation by migration to XML2007 iPres Beijing - MIXED: Preservation by migration to XML
2007 iPres Beijing - MIXED: Preservation by migration to XML
Dirk Roorda
 
인터렉티브 김지혜
인터렉티브 김지혜인터렉티브 김지혜
인터렉티브 김지혜jihaeariana
 
Periodismo (pero 'económico') - Lic.GigliBox
Periodismo (pero 'económico') - Lic.GigliBoxPeriodismo (pero 'económico') - Lic.GigliBox
Periodismo (pero 'económico') - Lic.GigliBox
Celeste Box
 
Institucional ThreeContent
Institucional ThreeContentInstitucional ThreeContent
Institucional ThreeContent
ThreeContent
 
Wielki WyśCigd2
Wielki WyśCigd2Wielki WyśCigd2
Wielki WyśCigd2studium
 
POSITIVE SIDE OF LIFE
POSITIVE SIDE OF LIFEPOSITIVE SIDE OF LIFE
POSITIVE SIDE OF LIFEHans Grover
 
LUK13
LUK13LUK13
LUK13LUK13
 
Opening presentationevening.2011
Opening presentationevening.2011Opening presentationevening.2011
Opening presentationevening.2011
jessievaz
 
Facundo mensaje
Facundo mensajeFacundo mensaje
Facundo mensajelartri
 
시에프와 타이포 피티 최종
시에프와 타이포 피티 최종시에프와 타이포 피티 최종
시에프와 타이포 피티 최종Young Ok Joeng
 
ZakręCona Zabawa D1
ZakręCona Zabawa D1ZakręCona Zabawa D1
ZakręCona Zabawa D1studium
 
Design is Thinking Made Visual
Design is Thinking Made VisualDesign is Thinking Made Visual
Design is Thinking Made Visual
guest7b6896f
 
Jak Zuzia SpotkałA KsięCia D3
Jak Zuzia SpotkałA KsięCia D3Jak Zuzia SpotkałA KsięCia D3
Jak Zuzia SpotkałA KsięCia D3studium
 
Danonkowa łąka
Danonkowa łąkaDanonkowa łąka
Danonkowa łąkastudium
 
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
Iwl Pcu
 

Viewers also liked (17)

2007 iPres Beijing - MIXED: Preservation by migration to XML
2007 iPres Beijing - MIXED: Preservation by migration to XML2007 iPres Beijing - MIXED: Preservation by migration to XML
2007 iPres Beijing - MIXED: Preservation by migration to XML
 
인터렉티브 김지혜
인터렉티브 김지혜인터렉티브 김지혜
인터렉티브 김지혜
 
Periodismo (pero 'económico') - Lic.GigliBox
Periodismo (pero 'económico') - Lic.GigliBoxPeriodismo (pero 'económico') - Lic.GigliBox
Periodismo (pero 'económico') - Lic.GigliBox
 
Institucional ThreeContent
Institucional ThreeContentInstitucional ThreeContent
Institucional ThreeContent
 
Wielki WyśCigd2
Wielki WyśCigd2Wielki WyśCigd2
Wielki WyśCigd2
 
POSITIVE SIDE OF LIFE
POSITIVE SIDE OF LIFEPOSITIVE SIDE OF LIFE
POSITIVE SIDE OF LIFE
 
LUK13
LUK13LUK13
LUK13
 
Uu 02 2000 Pjls
Uu 02 2000 PjlsUu 02 2000 Pjls
Uu 02 2000 Pjls
 
Opening presentationevening.2011
Opening presentationevening.2011Opening presentationevening.2011
Opening presentationevening.2011
 
Cv
CvCv
Cv
 
Facundo mensaje
Facundo mensajeFacundo mensaje
Facundo mensaje
 
시에프와 타이포 피티 최종
시에프와 타이포 피티 최종시에프와 타이포 피티 최종
시에프와 타이포 피티 최종
 
ZakręCona Zabawa D1
ZakręCona Zabawa D1ZakręCona Zabawa D1
ZakręCona Zabawa D1
 
Design is Thinking Made Visual
Design is Thinking Made VisualDesign is Thinking Made Visual
Design is Thinking Made Visual
 
Jak Zuzia SpotkałA KsięCia D3
Jak Zuzia SpotkałA KsięCia D3Jak Zuzia SpotkałA KsięCia D3
Jak Zuzia SpotkałA KsięCia D3
 
Danonkowa łąka
Danonkowa łąkaDanonkowa łąka
Danonkowa łąka
 
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
Managing Transboundary Risks in the Iullemeden Aquifer System (Dodo)
 

Similar to Constructive Access Control

Modern Techniques for Providing Security in Cloud Computing Environment
Modern Techniques for Providing Security in Cloud Computing EnvironmentModern Techniques for Providing Security in Cloud Computing Environment
Modern Techniques for Providing Security in Cloud Computing Environment
ijsrd.com
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
PayamBarnaghi
 
Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1
iotest
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1eyetech
 
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-AutomationDevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
Alex Senkevitch
 
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityOntology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityBarry Smith
 
Criticism of the scientific paper
Criticism of the scientific paperCriticism of the scientific paper
Criticism of the scientific paper
Dr. Hamdan Al-Sabri
 
Design Patterns Explained: From Analysis through Implementation
Design Patterns Explained: From Analysis through ImplementationDesign Patterns Explained: From Analysis through Implementation
Design Patterns Explained: From Analysis through Implementation
TechWell
 
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
Deborah McGuinness
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
Waqas Tariq
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
PROIDEA
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
PROIDEA
 
Natural Language Processing & Semantic Models in an Imperfect World
Natural Language Processing & Semantic Modelsin an Imperfect WorldNatural Language Processing & Semantic Modelsin an Imperfect World
Natural Language Processing & Semantic Models in an Imperfect WorldVital.AI
 
Semantic Web in Action: Ontology-driven information search, integration and a...
Semantic Web in Action: Ontology-driven information search, integration and a...Semantic Web in Action: Ontology-driven information search, integration and a...
Semantic Web in Action: Ontology-driven information search, integration and a...
Amit Sheth
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
DrAmarNathDhebla
 
AccessControl.ppt
AccessControl.pptAccessControl.ppt
AccessControl.ppt
DAKSHATAPANCHAL2
 
Better integrations through open interfaces
Better integrations through open interfacesBetter integrations through open interfaces
Better integrations through open interfacesSteve Speicher
 
Using construction grammar in conversational systems
Using construction grammar in conversational systemsUsing construction grammar in conversational systems
Using construction grammar in conversational systems
CJ Jenkins
 
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Stijn (Stan) Christiaens
 

Similar to Constructive Access Control (20)

Modern Techniques for Providing Security in Cloud Computing Environment
Modern Techniques for Providing Security in Cloud Computing EnvironmentModern Techniques for Providing Security in Cloud Computing Environment
Modern Techniques for Providing Security in Cloud Computing Environment
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
 
Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1
 
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-AutomationDevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
 
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityOntology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
 
Criticism of the scientific paper
Criticism of the scientific paperCriticism of the scientific paper
Criticism of the scientific paper
 
Design Patterns Explained: From Analysis through Implementation
Design Patterns Explained: From Analysis through ImplementationDesign Patterns Explained: From Analysis through Implementation
Design Patterns Explained: From Analysis through Implementation
 
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
20120718 linkedopendataandnextgenerationsciencemcguinnessesip final
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
 
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...
 
Natural Language Processing & Semantic Models in an Imperfect World
Natural Language Processing & Semantic Modelsin an Imperfect WorldNatural Language Processing & Semantic Modelsin an Imperfect World
Natural Language Processing & Semantic Models in an Imperfect World
 
Semantic Web in Action: Ontology-driven information search, integration and a...
Semantic Web in Action: Ontology-driven information search, integration and a...Semantic Web in Action: Ontology-driven information search, integration and a...
Semantic Web in Action: Ontology-driven information search, integration and a...
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
 
AccessControl.ppt
AccessControl.pptAccessControl.ppt
AccessControl.ppt
 
Better integrations through open interfaces
Better integrations through open interfacesBetter integrations through open interfaces
Better integrations through open interfaces
 
Using construction grammar in conversational systems
Using construction grammar in conversational systemsUsing construction grammar in conversational systems
Using construction grammar in conversational systems
 
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
 

More from Valeria de Paiva

Dialectica Comonoids
Dialectica ComonoidsDialectica Comonoids
Dialectica Comonoids
Valeria de Paiva
 
Dialectica Categorical Constructions
Dialectica Categorical ConstructionsDialectica Categorical Constructions
Dialectica Categorical Constructions
Valeria de Paiva
 
Logic & Representation 2021
Logic & Representation 2021Logic & Representation 2021
Logic & Representation 2021
Valeria de Paiva
 
Constructive Modal and Linear Logics
Constructive Modal and Linear LogicsConstructive Modal and Linear Logics
Constructive Modal and Linear Logics
Valeria de Paiva
 
Dialectica Categories Revisited
Dialectica Categories RevisitedDialectica Categories Revisited
Dialectica Categories Revisited
Valeria de Paiva
 
PLN para Tod@s
PLN para Tod@sPLN para Tod@s
PLN para Tod@s
Valeria de Paiva
 
Networked Mathematics: NLP tools for Better Science
Networked Mathematics: NLP tools for Better ScienceNetworked Mathematics: NLP tools for Better Science
Networked Mathematics: NLP tools for Better Science
Valeria de Paiva
 
Going Without: a modality and its role
Going Without: a modality and its roleGoing Without: a modality and its role
Going Without: a modality and its role
Valeria de Paiva
 
Problemas de Kolmogorov-Veloso
Problemas de Kolmogorov-VelosoProblemas de Kolmogorov-Veloso
Problemas de Kolmogorov-Veloso
Valeria de Paiva
 
Natural Language Inference: for Humans and Machines
Natural Language Inference: for Humans and MachinesNatural Language Inference: for Humans and Machines
Natural Language Inference: for Humans and Machines
Valeria de Paiva
 
Dialectica Petri Nets
Dialectica Petri NetsDialectica Petri Nets
Dialectica Petri Nets
Valeria de Paiva
 
The importance of Being Erneast: Open datasets in Portuguese
The importance of Being Erneast: Open datasets in PortugueseThe importance of Being Erneast: Open datasets in Portuguese
The importance of Being Erneast: Open datasets in Portuguese
Valeria de Paiva
 
Negation in the Ecumenical System
Negation in the Ecumenical SystemNegation in the Ecumenical System
Negation in the Ecumenical System
Valeria de Paiva
 
Constructive Modal and Linear Logics
Constructive Modal and Linear LogicsConstructive Modal and Linear Logics
Constructive Modal and Linear Logics
Valeria de Paiva
 
Semantics and Reasoning for NLP, AI and ACT
Semantics and Reasoning for NLP, AI and ACTSemantics and Reasoning for NLP, AI and ACT
Semantics and Reasoning for NLP, AI and ACT
Valeria de Paiva
 
NLCS 2013 opening slides
NLCS 2013 opening slidesNLCS 2013 opening slides
NLCS 2013 opening slides
Valeria de Paiva
 
Dialectica Comonads
Dialectica ComonadsDialectica Comonads
Dialectica Comonads
Valeria de Paiva
 
Categorical Explicit Substitutions
Categorical Explicit SubstitutionsCategorical Explicit Substitutions
Categorical Explicit Substitutions
Valeria de Paiva
 
Logic and Probabilistic Methods for Dialog
Logic and Probabilistic Methods for DialogLogic and Probabilistic Methods for Dialog
Logic and Probabilistic Methods for Dialog
Valeria de Paiva
 
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
Valeria de Paiva
 

More from Valeria de Paiva (20)

Dialectica Comonoids
Dialectica ComonoidsDialectica Comonoids
Dialectica Comonoids
 
Dialectica Categorical Constructions
Dialectica Categorical ConstructionsDialectica Categorical Constructions
Dialectica Categorical Constructions
 
Logic & Representation 2021
Logic & Representation 2021Logic & Representation 2021
Logic & Representation 2021
 
Constructive Modal and Linear Logics
Constructive Modal and Linear LogicsConstructive Modal and Linear Logics
Constructive Modal and Linear Logics
 
Dialectica Categories Revisited
Dialectica Categories RevisitedDialectica Categories Revisited
Dialectica Categories Revisited
 
PLN para Tod@s
PLN para Tod@sPLN para Tod@s
PLN para Tod@s
 
Networked Mathematics: NLP tools for Better Science
Networked Mathematics: NLP tools for Better ScienceNetworked Mathematics: NLP tools for Better Science
Networked Mathematics: NLP tools for Better Science
 
Going Without: a modality and its role
Going Without: a modality and its roleGoing Without: a modality and its role
Going Without: a modality and its role
 
Problemas de Kolmogorov-Veloso
Problemas de Kolmogorov-VelosoProblemas de Kolmogorov-Veloso
Problemas de Kolmogorov-Veloso
 
Natural Language Inference: for Humans and Machines
Natural Language Inference: for Humans and MachinesNatural Language Inference: for Humans and Machines
Natural Language Inference: for Humans and Machines
 
Dialectica Petri Nets
Dialectica Petri NetsDialectica Petri Nets
Dialectica Petri Nets
 
The importance of Being Erneast: Open datasets in Portuguese
The importance of Being Erneast: Open datasets in PortugueseThe importance of Being Erneast: Open datasets in Portuguese
The importance of Being Erneast: Open datasets in Portuguese
 
Negation in the Ecumenical System
Negation in the Ecumenical SystemNegation in the Ecumenical System
Negation in the Ecumenical System
 
Constructive Modal and Linear Logics
Constructive Modal and Linear LogicsConstructive Modal and Linear Logics
Constructive Modal and Linear Logics
 
Semantics and Reasoning for NLP, AI and ACT
Semantics and Reasoning for NLP, AI and ACTSemantics and Reasoning for NLP, AI and ACT
Semantics and Reasoning for NLP, AI and ACT
 
NLCS 2013 opening slides
NLCS 2013 opening slidesNLCS 2013 opening slides
NLCS 2013 opening slides
 
Dialectica Comonads
Dialectica ComonadsDialectica Comonads
Dialectica Comonads
 
Categorical Explicit Substitutions
Categorical Explicit SubstitutionsCategorical Explicit Substitutions
Categorical Explicit Substitutions
 
Logic and Probabilistic Methods for Dialog
Logic and Probabilistic Methods for DialogLogic and Probabilistic Methods for Dialog
Logic and Probabilistic Methods for Dialog
 
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
Intuitive Semantics for Full Intuitionistic Linear Logic (2014)
 

Recently uploaded

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

Constructive Access Control

  • 1. Constructive Access Control: Revisited? Valeria de Paiva Intelligent Systems Lab PARC (Joint work with Jessica Staddon, CSL)
  • 2. Outline  Motivation: access control must be logic…  Background  Basic framework  A new system?  Discussion & applications Caveat: no expert, a talk to logicians interested in the problem… 11/09/09
  • 3. Why the buzz about access control?  Ubiquity of computing and growth of the Internet turned Information Security into a central area of research in computer science.  Many areas within Information Security. For logicians there’s considerable work on logical methods for access control.  For example: – Abadi et al, 1993, Abadi, 2003, Abadi 2006 – Garg et al, 2006 – Garg, Pfenning 2006 – Garg, Abadi, 2008 » Thanks Martin and Deepak! 11/09/09
  • 4. Access control in current practice (according to Abadi)  Access control is pervasive – applications – virtual machines – operating systems – firewalls – doors – …  Access control seems difficult to get right.  Distributed systems make it harder. 11/09/09
  • 5. What is Access Control?  In computer security, access control consists in deciding whether an agent that requests some action should have his request granted or not.  Decisions are based on access control policies, the combination of several policies at different layers and from different entities.  A single policy may be easy to understand e.g. user Valeria may want to delete file1 and if she owns the file the admin should allow it.  But the consequences of even a single policy can get complicated, when there are many principals, many roles, many resources, delegation, revocation, etc. 11/09/09
  • 6. The access control model Elements: – Resources – Requests – Sources for requests, called principals – A reference monitor to decide on requests – Control policies Dr of ee R e e e j nc Po m b iaa o O rl p n e c r i p t i oi nt n or c t S e Gs o q ue u u a o r R c e rR e s du t r c e 11/09/09
  • 7. General theories and systems  Over the years, there have been many theories and systems for access control. – Logics – Languages – Infrastructures (e.g., PKIs) – Architectures  They aim to explain, organize, and unify access control.  We’re interested in logics and languages… 11/09/09
  • 8. Access Control needs logic? “Although access control may sometimes seem conceptually straightforward, it is both complex and error-prone in practice. […] One may hope that logic would provide a simple, solid, and general foundation for access control, as well as methods for designing, implementing, and validating particular access control mechanisms. In fact, although logic is not a panacea, its applications in access control have been substantial and beneficial.” M. Abadi, Invited Address, LICS 2003 11/09/09
  • 9. Access control needs logic  We need to combine access control policies, have groups of principals, revocation, delegation, roles, etc.  Things can get very complicated. There can be gaps, inconsistencies, ambiguity, loopholes, obscurity.  Systems can be easy to break and security is endangered. 11/09/09
  • 10. On the other hand… (Constructive) Logic can:  Express policies – Admin says owns (Valeria, file) -> may_delete(Valeria, file)  Express authorization questions – Does Valeria have a proof of the proposition Admin says may_delete(Valeria, file)?  Logical proofs allow us: – Construct evidence (assemble proof) – Verify evidence (verify proof) – Reason from assumptions (given credentials) 11/09/09
  • 11. Logics for Access Control  Encode and reason within policies  Analyze policies (reason about them) – Express (and reason about) private knowledge?  Prove properties of policies, check for unintended consequences. Enforce policies?  Proofs hard to construct, easy to verify – Lead to Proof Carrying Authorization Appel&Felten, Bauer  PCA insight : the user/ principal wanting access must construct a proof, the server will simply check the proof to grant access uses higher-order logic, can we make it simpler? 11/09/09
  • 12. Logics of Access Control  Several systems proposed and studied.  Traditionally classical modal logics with extra constructs (Abadi et al 1993)  Garg&Pfenning(2006) have proposed a constructive lax logic of access control, non-interference  Abadi (2006) has proposed a lax logic based system DCC, non-interference  Garg et al(2006) have proposed a “linear” logic for access control, credentials are resources  Garg&Abadi(2008 to appear) have four systems based on lax logic 11/09/09
  • 13. Background1: Principals  A principal is any user, machine, program, organization that – Either makes requests, or – Makes statements (policies)  Examples: – Humans: Alice, Bob, Charlie, ... – Users: 500, 501, admin, ... – Programs: MSWord, Acrobat Reader, ... – Organizations: CMU, SRI, ACM, Wells-Fargo... – Public keys: 0xaf5436, 0x123458 11/09/09
  • 14. Background2: “A says s” Taking Garg&Abadi (GA08) as basic reference  Basic construct operator “says”: applied to principal A and formula s, “A says s”. - Abstracts away from implementation concerns  “A says s” means intuitively that A asserts or supports s, e.g. “A says delete-file1”.  Different access control logics have subtly different meanings for “says”.  Note similarity to “K attests A” in cyberlogic, where K is (has to be?) a public key, A is a formula 11/09/09
  • 15. Background3: “speaks for”  Operator “speaks for”, applied to principals A and B, A => B  This is read “A speaks for B” and intuitively means that if A says s then B says s, for all s.  In particular if KAlice is the public key for Alice we have KAlice => Alice. also if S a server then S => Alice, if S is acting for Alice  Different access control logics have subtly different meanings for “speaks for”  Not fine-grained enough?  (Similar to cyberlogic’s delegation?) 11/09/09
  • 16. Which logic of access control?  Intuitionistic basis, as we want – a Curry-Howard isomorphism, – evidence instead of truth – use proofs as witnesses for PCA  Have a collection of principals A, B,..  How do we represent logically the constructs for access control?  All recent work mentioned uses an indexed collection of lax modalities 11/09/09
  • 17. What’s a lax modality?  A modality is an unary operator acting on propositions  Curry(1952) a possibility modality that half-behaves like a necessity one.  Like possibility, twice the modality implies it once. But like necessity as it satisfies distribution over implication.  Also known as computational logic, CL, (Benton, Bierman, de Paiva, JFP 1998)  Properties: s  A says s A says A says s  A says s A says (st)  (A says s)  (A says t) 11/09/09
  • 18. Why lax modalities?  Need to model “A says s”  “says” has some characteristics of possibility: if “A says (A says s)” then “A says s”, if “A says (s->t)” then “A says s-> A says t”  Lax modalities buy you non-interference (Abadi06, GargPfenning06)  Lax modalities buy you “hand-off axiom”: if A says that B speaks for A then B does speak for A (Abadi06)  Lax modality well-understood logic type theory 11/09/09
  • 19. How to do lax modalities?  Different proof systems: Moggi89,de Paiva et al 98, Mendler&Fairtlough97  Garg&Pfenning: ‘judgemental’ logic (2001)  Based on Martin-Loeuf’s ideas: intro and elim rules plus cut elim are the meaning of connectives  Works for S4-style connectives, dual-sized sequents (e.g. linear logic exponentials)  Can we do less powerful/less symmetric modalities? 11/09/09
  • 20. Why not lax modalities?  Axiom (s -> A says s) means every principal says s, if s is true – Difficult to believe that principals are that ideal  Similarly, “speaks for” too strong  Alice would like to make sure that Bob speaks for her in certain circumstances, not for all s.  Maybe can use a simple K constructive modality for “says”… 11/09/09
  • 21. A new system?  Caveat: work not really done…  But Curry-Howard Iso for Basic Modal Logic, (Bellin, de Paiva, Ritter, 2001)  Bug in published version, being corrected and extended now – Thanks to Kakutani (2006) for correcting it!  Type theory, semantics in place: – Normalization, subject reduction, soundness&completeness, internal language too  Non-interference works too, “hand off”? 11/09/09
  • 22. Extensions  Garg: linear logic to deal with credentials that are consumable resources – Apparently proof-theory done, implementation is the problem – Garg et al 06, Bauer et al 06  Garg et al: temporal aspects of security in the works – I also want my versions with and without linear basis – Constructive temporal logics in the market not good 11/09/09
  • 23. Applications?  A bit of unifying glee: 1995 proposal on logics of authentication  PCA for less expressive logics – Grey project at CMU interesting, but it would be nice if it could be simpler, Manifest Security?  Access control for multiple enterprise repositories: – What if our principals were the parties that need to cooperate when someone is buying a house? – Can our access control theories help out? – Some Stanford/PORTIA work on this direction 11/09/09
  • 24. Conclusion  Logic clearly useful for access control  Multiple applications and opportunities  More work required on trade-offs between logical systems, automation, etc  Innovative applications may send the formalism into totally different directions 11/09/09
  • 26. References  Manifest Security for Distributed Information Karl Crary, Robert Harper, Frank Pfenning 2006  Garg&Abadi08, Garg&Pfenning06, Garg et al 06  PCA Appel&Felten 99, Bauer’s thesis 03 11/09/09
  • 27. A calculus for access control [Abadi, Burrows, Lampson, and Plotkin, 1993]  A simple notation for assertions – A says s – A speaks for B (sometimes written A ⇒ B)  With logical rules – ⊢ A says (s → t) → (A says s) → (A says t) – If ⊢ s then ⊢ A says s. – ⊢ A speaks for B → (A says s) → (B says s) – ⊢ A speaks for A – ⊢ A speaks for B ∧ B speaks for C → A speaks for 11/09/09 C
  • 28. Enforcing policies?  An access control policy can be presented as a logical theory in an access control logic  A principal is granted access to a resource if there is a formal proof that the principal is authorized the use of the resource according to the accepted policy  Constructivity buys you PCA? 11/09/09