Flexible access control policy specification with constraint logic programming Steve Barker, Peter J. Stuckey Presenter: Vijayant Dhankhar.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Applications Computational LogicLecture 11 Michael Genesereth Spring 2004.
1 Knowledge and reasoning – second part Knowledge representation Logic and representation Propositional (Boolean) logic Normal forms Inference in propositional.
Constraint Satisfaction Problems
1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
1 Vorlesung Informatik 2 Algorithmen und Datenstrukturen (Parallel Algorithms) Robin Pomplun.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
1 A Model of OASIS Role-Based Access Control and Its Support for Active Security Rick Murphy, IT 862, Spring 2005.
ARBAC 97 (ADMINISTRATIVE RBAC)
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Algebraic Expressions
UNITED NATIONS Shipment Details Report – January 2006.
By John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman
We need a common denominator to add these fractions.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
Relational data objects 1 Lecture 6. Relational data objects 2 Answer to last lectures activity.
1 Discreteness and the Welfare Cost of Labour Supply Tax Distortions Keshab Bhattarai University of Hull and John Whalley Universities of Warwick and Western.
Evaluating Window Joins over Unbounded Streams Author: Jaewoo Kang, Jeffrey F. Naughton, Stratis D. Viglas University of Wisconsin-Madison CS Dept. Presenter:
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
Turing Machines.
PP Test Review Sections 6-1 to 6-6
EU market situation for eggs and poultry Management Committee 20 October 2011.
Copyright © 2013, 2009, 2005 Pearson Education, Inc.
VOORBLAD.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Analyzing Genes and Genomes
1 Let’s Recapitulate. 2 Regular Languages DFAs NFAs Regular Expressions Regular Grammars.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Clock will move after 1 minute
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
9. Two Functions of Two Random Variables
Techniques for proving programs with pointers A. Tikhomirov.
1 Decidability continued…. 2 Theorem: For a recursively enumerable language it is undecidable to determine whether is finite Proof: We will reduce the.
1 Programming Languages (CS 550) Mini Language Interpreter Jeremy R. Johnson.
Presentation transcript:

Flexible access control policy specification with constraint logic programming Steve Barker, Peter J. Stuckey Presenter: Vijayant Dhankhar

2 Outline Introduction and Motivation Other Proposed Approaches Constrained Logic Programming Intro. RBAC SFK Model and ESFK Results Conclusion

3 Introduction Access control policies have been limited in expressive power Allow simple types of access policy to be defined for protecting simple types of information systems. Goal: flexibly represent access policies for protecting the increasingly diverse and complex types of systems

4 Access Control Policies Closed – positive authorizations Open – negative authorizations Hybrid – both Temporal - specify an interval of time for which an authorization is to hold Conflict Resolution Strategy resolve the inconsistent authorizations by specifying which of the authorizations in a conflicting pair ought to hold

5 Candidate Approaches Simple Solution: Turing complete language Special Purpose languages: temporal authorization language High-level declarative language: PROLOG

6 Approach (LP vs. CLP) conciseness of specification easily understandable strong technical results that enable properties of a policy to be proved enable certain policies to be formulated that cannot be satisfactorily represented in LP efficiency uninstantiated arithmetic variables

7 CLP primitive constraint [ p(t 1 … t n ) ; arity = n ] constraint –conjunction of primitive constraints c 1 ^ c 2 ^ …. ^ c k equational constraints t1 = t2 or t1 t2 (eg. User = Fred) constraints over nonnegative integers T = 3 or X > Y or Y = (Z ÷ 1000)

8 CLP cont literal –primitive constraint –atom User Defined Predicate Symbol –p(t 1,…,t n ) goal sequence of literals L 1 ^ …. ^ L m rule H L 1 ^ …. ^ L k or [ ] Head: H; Body: L 1 ^ …. ^ L k If k=0 then Rule is a Fact

9 CLP cont constraint logic program ( ) is a finite set of rules definite program no negative literals could be cyclic stratified program allows negative literals no cycle with negative edge recursion free programs allow negative literal no cycles terminate

10 CLP cont definition of n-place predicate symbol in logic program »Where Bi is rule of form Clark Completion * Conjunction of definitions of user defined predicates in Solver solv: C Bool

11 Operational Semantics State G: current literal or Goal C: current constraint Reduction for Definite Programs

12 Operational Semantics Cont Reduction with Negation Constructive Negation Negation as Failure

13 RBAC SFK Models

14 SFK Model Domain: A set U of user identifiers A set O of object identifiers A set A of access privilege identifiers A set R of role identifiers Relations: AUTHORIZATION U x A x O PERMISSION A x O URA U x R PRA A x O x R DRA A x O x R ACTIVE U x R

15 Primitive Predicates in Model

16 Representing RBAC Programs Role Hierarchies in RBAC Programs –DS: irreflexive and intransitive hence acyclic –senior_to: represented as Facts (finite/non recursive) NOTE: set of n 2 Facts at worst

17 Representing RBAC Programs Sessions –appending an activate(u i, r j ) fact. –RULE: (active(U, R) activate(U, R)) –deactivates a role R1 by retracting the appropriate activate fact User-Role Review: –to extract information about the access policy the program represents

18 Representing RBAC Programs Authorized Access permitted assumes that the activation by U of R1 also activates all roles that are junior to R1 Activation policy [check active(U, R2)]

19 Beyond RBAC Programs Denial Role Assignments –Authorization expressed in terms of pra dra senior_to, etc. –Various policies implementable Object Hierarchies irreflexive-intransitive DI reflexive transitive INCLUDES

20 Beyond RBAC Programs Inheritance Policies –permission inheritance path –denial inheritance path

21 Beyond RBAC Programs Defining Authorized Access

22 Separation of Duties (RBAC C3A ) SSD R x R DSD R x R

23 Permission Role Review (RBAC S4A ) To extend RBAC C3A programs to RBAC S4A programs, permission-role and denial-role reviews must be supported. –pra queries –dra queries

24 Temporal Authorizations enable a SA to specify that user access to a data item for a restricted interval of time Paper considers RBAC H2A an extra argument is added to the ura, pra, and dra predicates

25 Temporal Authorizations Authorized Denied

26 Representing Time Discrete time points (natural numbers) –constraint predicates

27 Temporal RBAC Examples URA PRA DRA

28 Temporal RBAC Derivation Rules –Example or NONSTRATIFIED – paper claims it terminates

29 Access Control Evaluation Using Operational Semantics for CLP –Example: Jo requests write access on o1 on 2001/03/02, and active role r2

30 Results

31 Results (Separation of Duties)

32 Administrative Queries Example: Query: Answer:

33 Performance Measures 53 role RBAC H2A role hierarchy (a total of 312 senior to facts) 530 users and 497 objects. 650 ura rules, 1092 dra rules, and 1185 pra rules simple solver (LP), constraint solving specialized(CLP)

34 Future Work In future work we want to consider how other forms of limitation on access –accessing objects only at certain locations –from certain machines –etc.

35 Conclusions Could be easily extended to do Administrative RBAC (predicate admin_scope etc..). Use of Negation as Failure instead of Constructive Negation. –Administrative Queries with negation –Not as expressive in policy (can not create new bindings for query variables)

36 Conclusions Cont No restrictions specified to make the program Stratified or Recursion Free. –In case of derivations, 3 valued to 2 valued consequence (does it hold?). [Ura(…) L1 ^ not Ura(…)] History based constraints should be added to ESFK model. –Help in modeling states in Temporal RBAC

37 Conclusions Cont SA does Administration of rules? –User does Activate (ui, rj) fact.