skip to main content
10.1145/2967973.2968605acmotherconferencesArticle/Chapter ViewAbstractPublication PagesppdpConference Proceedingsconference-collections
research-article

Analysis of access control policy updates through narrowing

Published:05 September 2016Publication History

ABSTRACT

Administration of access control policies is a difficult task, especially in large organizations. We consider the problem of detecting whether administrative actions can yield in policies where some security goals are compromised. In particular, we are interested in problems generated by modifications --- such as adding/deleting elements to/from the set of possible users or permissions --- of policies specified as term-rewrite systems. We propose to use rewriting techniques to compare the behaviors of the modified version and the original version of the policy. More precisely, we use narrowing to compute counter-examples to the equivalence of rewrite-based policies. We prove that our technique provides a sound and complete way to recursively enumerate the set of counter-examples, even when this set is not finite, or when a mistake of the administrator makes one or both systems non-terminating.

References

  1. S. Antoy. Definitional Trees. In In Proc. of the 3rd International Conference on Algebraic and Logic Programming, pages 143--157. Springer LNCS, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Antoy, R. Echahed, and M. Hanus. A Needed Narrowing Strategy. In Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 268--279. ACM, 1994. 00415. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Antoy, B. Massey, M. Hanus, and F. Steiner. An implementation of narrowing strategies. In Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming, pages 207--217. ACM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Armando and S. Ranise. Scalable automated symbolic analysis of administrative role-based access control policies by smt solving. J. Comput. Secur., 20(4):309--352, July 2012. Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings, pages 187--196, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Barker and M. Fernández. Term rewriting for access control. In Data and Applications Security. Proceedings of DBSec'2006, Lecture Notes in Computer Science. Springer-Verlag, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  7. G. Barthe, G. Dufay, M. Huisman, and S. M. de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proceedings of e-SMART'01, number 2140 in Lecture Notes in Computer Science. Springer-Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Bertolissi and M. Fernández. A rewriting framework for the composition of access control policies. In Proceedings of the 10th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP'08), Valencia, 2008. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Bertolissi and M. Fernández. A metamodel of access control for distributed environments: Applications and properties. Inf. Comput., 238:187--207, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Bertolissi, M. Fernández, and S. Barker. Dynamic Event-based Access Control as Term Rewriting. In In Proc. DBSEC 2007, LNCS. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. A. Bonatti and P. Samarati. Logics for authorization and security. In J. Chomicki, R. van der Meyden, and G. Saake, editors, Logics for Emerging Applications of Databases, pages 277--323. Springer, 2003.Google ScholarGoogle Scholar
  12. B. Braßel, M. Hanus, B. Peemöller, and F. Reck. KiCS2: A new compiler from Curry to Haskell. In International Workshop on Functional and Constraint Logic Programming, pages 1--18. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Dershowitz and J.-P. Jouannaud. Rewrite Systems. In Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B), pages 243--320. 1990. 00010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. J. Dougherty, C. Kirchner, H. Kirchner, and A. S. de Oliveira. Modular access control via strategic rewriting. In Proceedings of 12th European Symposium On Research In Computer Security, ESORICS, pages 578--593, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Echahed and F. Prost. Security policy in a declarative style. In Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP'05). ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Escobar. Refining Weakly Outermost-Needed Rewriting and Narrowing. In Proc. of 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, PPDP'03, pages 113--123. ACM Press, 2003. 00021. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Escobar, C. Meadows, and J. Meseguer. A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theor. Comput. Sci., 367:162--202, November 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. 2001.Google ScholarGoogle Scholar
  19. A. L. Ferrara, P. Madhusudan, and G. Parlato. Policy analysis for self-administrated role-based access control. In Tools and Algorithms for the Construction and Analysis of Systems, pages 432--447. Springer Berlin Heidelberg, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Hanus. Functional logic programming: From theory to Curry. Technical report, Citeseer, 2005.Google ScholarGoogle Scholar
  21. M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Commun. ACM, 19(8):461--471, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. Huet and J.-J. Lévy. Computations in orthogonal rewriting systems, I and II. In J.-L. Lassez and G. Plotkin, editors, Computational Logic: Essays in Honor of Alan Robinson, pages 395--443 and 415--443. The MIT Press, Cambridge, MA, 1992.Google ScholarGoogle Scholar
  23. J.-M. Hullot. Canonical forms and unification. In G. Goos, J. Hartmanis, W. Brauer, P. Brinch Hansen, D. Gries, C. Moler, G. Seegmüller, J. Stoer, N. Wirth, W. Bibel, and R. Kowalski, editors, 5th Conference on Automated Deduction Les Arcs, France, July 8-11, 1980, volume 87, pages 318--334. Springer Berlin Heidelberg, Berlin, Heidelberg, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Jagadeesan and V. Saraswat. Timed Constraint Programming: A Declarative Approach to Usage Control. In Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP'05). ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Jha, N. Li, M. Tripunitara, Q. Wang, and W. Winsborough. Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing, 5(4):242--255, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Kirchner, H. Kirchner, and A. S. de Oliveira. Analysis of Rewrite-Based Access Control Policies. Electronic Notes in Theoretical Computer Science, 234:55--75, Mar. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. W. Klop. Term Rewriting Systems. In S. Abramsky, D. Gabbay, and T. Maibaurn, editors, Handbook of Logic in Computer Science, pages 1--116. Oxford University Press, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. W. Klop and A. Middeldorp. Sequentiality in Orthogonal Term Rewriting Systems. Journal of Symbolic Computation, 12:161--195, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Koch, L. Mancini, and F. Parisi-Presicce. A graph based formalism for RBAC. In Proc. of SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, New York, USA, 2004, pages 129--187, 2004.Google ScholarGoogle Scholar
  30. N. Li and M. V. Tripunitara. Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC), 9(4):391--420, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Lockman and N. Minsky. Unidirectional transport of rights and take- grant control. IEEE Transactions on Software Engineering, SE-8:597--604, November 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. W. Lux and H. Kuchen. An Efficient Abstract Machine for Curry. In K. Beiersdörfer, G. Engels, and W. Schäfer, editors, Informatik '99 --- Informatik überwindet Grenzen, 29. Jahrestagung der Gesellschaft für Informatik, Paderborn, 5-9. Oktober 1999, pages 390--399. Springer Verlag, 1999.Google ScholarGoogle Scholar
  33. J. Meseguer and P. Thati. Symbolic Reachability Analysis Using Narrowing and Its Application to Verification of Cryptographic Protocols. Higher Order Symbol. Comput., 20(1-2):123--160, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. A. Middeldorp and E. Hamoen. Completeness Results for Basic Narrowing. Applicable Algebra in Engineering, Communication and Computing, 5(3-4):213--253, 1994. 00138.Google ScholarGoogle Scholar
  35. R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating schemes. J. ACM, 35(2):404--432, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9--19, Nov. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. S. Sandhu and V. Bhamidipati. Role-based administration of user-role assignment: The ura97 model and its oracle implementation. Journal Of Computer Security, 7:317--342, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. A. Santana de Oliveira. Réécriture et Modularité pour les Politiques de Sécurité. PhD thesis, Université Henri Poincaré, Nancy, France, 2008.Google ScholarGoogle Scholar
  40. A. Sasturkar, P. Yang, S. D. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. In Computer Security Foundations Workshop, 2006. 19th IEEE, pages 13--pp. IEEE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. S. D. Stoller, P. Yang, C. R. Ramakrishnan, and M. I. Gofman. Efficient policy analysis for administrative role based access control. In Proceedings of the 14th ACM conference on Computer and communications security, pages 445--455. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. L. Viganò. Automated security protocol analysis with the AVISPA tool. In Proc. of MFPS'05, volume 155 of ENTCS, pages 61--86. Elsevier, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE '04, pages 45--55. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analysis of access control policy updates through narrowing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PPDP '16: Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming
        September 2016
        249 pages
        ISBN:9781450341486
        DOI:10.1145/2967973
        • Conference Chair:
        • James Cheney,
        • Program Chair:
        • Germán Vidal

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 September 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        PPDP '16 Paper Acceptance Rate17of37submissions,46%Overall Acceptance Rate230of486submissions,47%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader