An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date: 09-22-05.

Slides:



Advertisements
Similar presentations
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Advertisements

Semantics Static semantics Dynamic semantics attribute grammars
ICE1341 Programming Languages Spring 2005 Lecture #6 Lecture #6 In-Young Ko iko.AT. icu.ac.kr iko.AT. icu.ac.kr Information and Communications University.
Architecture Representation
Overview of Previous Lesson(s) Over View  Front end analyzes a source program and creates an intermediate representation from which the back end generates.
Answer Set Programming Overview Dr. Rogelio Dávila Pérez Profesor-Investigador División de Posgrado Universidad Autónoma de Guadalajara
Of 27 lecture 7: owl - introduction. of 27 ece 627, winter ‘132 OWL a glimpse OWL – Web Ontology Language describes classes, properties and relations.
1 Ontology Language Comparisons doug foxvog 16 September 2004.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
1 Relational Algebra & Calculus. 2 Relational Query Languages  Query languages: Allow manipulation and retrieval of data from a database.  Relational.
LTAG Semantics on the Derivation Tree Presented by Maria I. Tchalakova.
An Extensible System for Merging Two Models Rachel Pottinger University of Washington Supervisors: Phil Bernstein and Alon Halevy.
C. Varela; Adapted w/permission from S. Haridi and P. Van Roy1 Declarative Computation Model Defining practical programming languages Carlos Varela RPI.
Constraint Logic Programming Ryan Kinworthy. Overview Introduction Logic Programming LP as a constraint programming language Constraint Logic Programming.
Firewall Policy Queries Author: Alex X. Liu, Mohamed G. Gouda Publisher: IEEE Transaction on Parallel and Distributed Systems 2009 Presenter: Chen-Yu Chang.
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
VALIDATION OF INTEGRATED POLICY USING ALLOY Manachai Toahchoodee
Programming Language Semantics Mooly SagivEran Yahav Schrirber 317Open space html://
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6 The Relational Algebra and Relational Calculus.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Semantics with Applications Mooly Sagiv Schrirber html:// Textbooks:Winskel The.
1 Relational Algebra and Calculus Yanlei Diao UMass Amherst Feb 1, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
Linear Systems The definition of a linear equation given in Chapter 1 can be extended to more variables; any equation of the form for real numbers.
1/25 Pointer Logic Changki PSWLAB Pointer Logic Daniel Kroening and Ofer Strichman Decision Procedure.
CSC 8310 Programming Languages Meeting 2 September 2/3, 2014.
PPL Syntax & Formal Semantics Lecture Notes: Chapter 2.
Knowledge Mediation in the WWW based on Labelled DAGs with Attached Constraints Jutta Eusterbrock WebTechnology GmbH.
Syntax & Semantic Introduction Organization of Language Description Abstract Syntax Formal Syntax The Way of Writing Grammars Formal Semantic.
1 CENTRIA, Dept. Informática da Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Caparica, Portugal. 2 Institute of Computer Science,
A Z Approach in Validating ORA-SS Data Models Scott Uk-Jin Lee Jing Sun Gillian Dobbie Yuan Fang Li.
Querying Structured Text in an XML Database By Xuemei Luo.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Grammars CPSC 5135.
CSE314 Database Systems The Relational Algebra and Relational Calculus Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson Ed Slide Set.
Chapter 7 Relational Algebra. Topics in this Chapter Closure Revisited The Original Algebra: Syntax and Semantics What is the Algebra For? Further Points.
ISBN Chapter 3 Describing Semantics -Attribute Grammars -Dynamic Semantics.
1 Relational Algebra & Calculus Chapter 4, Part A (Relational Algebra)
1 Relational Algebra and Calculas Chapter 4, Part A.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Semantically Processing The Semantic Web Presented by: Kunal Patel Dr. Gopal Gupta UNIVERSITY OF TEXAS AT DALLAS.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications Stuart Aitken Artificial Intelligence Applications.
Logics for Data and Knowledge Representation ClassL (part 1): syntax and semantics.
Programming Languages and Design Lecture 3 Semantic Specifications of Programming Languages Instructor: Li Ma Department of Computer Science Texas Southern.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 Database Management Systems Chapter 4 Relational Algebra.
Formal Methods in SE Lecture 16 Formal Methods in SE Qaisar Javaid Assistant Professor.
ece 627 intelligent web: ontology and beyond
Overview of Previous Lesson(s) Over View 3 Model of a Compiler Front End.
First-Order Logic Semantics Reading: Chapter 8, , FOL Syntax and Semantics read: FOL Knowledge Engineering read: FOL.
OWL Web Ontology Language Summary IHan HSIAO (Sharon)
CSC3315 (Spring 2009)1 CSC 3315 Languages & Compilers Hamid Harroud School of Science and Engineering, Akhawayn University
PPL Syntax & Formal Semantics Lecture Notes: Chapter 2.
Propositional Logic. Assignment Write any five rules each from two games which you like by using propositional logic notations.
Logics for Data and Knowledge Representation ClassL (part 1): syntax and semantics.
Fuzzy Relations( 關係 ), Fuzzy Graphs( 圖 形 ), and Fuzzy Arithmetic( 運算 ) Chapter 4.
Chapter 3 – Describing Syntax
Describing Syntax and Semantics
A Simple Syntax-Directed Translator
SysML v2 Formalism: Requirements & Benefits
Data Models.
Relational Algebra Chapter 4, Part A
Logics for Data and Knowledge Representation
Object-Oriented Knowledge Representation
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Semantic Markup for Semantic Web Tools:
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
CASL-Common Algebraic Specification Language
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Relational Algebra & Calculus
Logics for Data and Knowledge Representation
Presentation transcript:

An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:

Introduction  Increase expressiveness and flexibility of authorization languages  Supporting multiple polices in a single framework  Existing frameworks translate and merge different component policies into a single “program” (problems)  Policy composition framework  An algebra for combining security policies with formal semantics

Characteristics of A Composition Framework  Heterogeneous policy support  Support for unknown policies  Controlled interface  Expressiveness  Support of different abstraction levels  Formal semantics

An Algebra of Polices Preliminary Concepts  Authorization Term (s, o, a) {SxOxA}  A Policy is defined as a set of ground authorization terms (triples).  An authorization constraint language L acon  A rule language L rule  A semantic function closure p(L rule ) x p( SxOxA ) --> p( SxOxA )

Some simplification  Basic predicates, with at most three arguments, from distinct basic domains (S, A, O)  Hierarchical relationship within elements of a domain (s op s0) op={≥,≤,,=}  Horn clauses

Policy Expressions  Syntax (BNF) E: nonterminal policy expressions id: token type of policy identifiers T: template C: constructs describing L acon R: constructs describing L rule

Operation Definition (1)  Environments e a partial mapping from policy identifiers to sets of ground authorizations  Addition (+) It merges two policies by returning their union.

Operation Definition (2)  Conjunction (&) It merges two policies by returning their intersection.  Subtraction (-). It restricts a policy by eliminating all the accesses in a second policy.

Operation Definition (3)  Closure (*) It closes a policy under a set of inference (derivation) rules.  Scoping restriction (ˆ) It restricts the application of a policy to a given set of subjects, objects, and actions. c: constraints : substitution

Operation Definition (4)  Overriding (o). It replaces part of a policy with a corresponding fragment of a second policy. The portion to be replaced is specified by means of a third policy. for instance,

Operation Definition (5)  Template ( ). It defines a partially specified policy that can be completed by supplying the parameters.

Example1: Hospital  Three departments: Radiology, Surgery, Medicine  No access to the lab_tests data unless patient consent  Two divisions of Medical dept.: Cardiology and Oncology

Example2 : University Laboratories  Student must be authorized by laboratory tutors (Smith, machine1,login) and department administration (cs101,cs- lab,login)  Forbidden to students blacklisted only a permission from provost can override

Reasoning based on Formal Semantics

Evaluating Policy Expressions  Translating algebraic expressions into equivalent logic programs (pe2lp)  In order to provide executable specifications compatible with different evaluation strategies.  pe2lp creates a distinct predicate symbol for each policy identifier and for each internal node in the syntax tree of the given algebraic expression.  Labeling an operator with a distinct integer. Formally, such extended expressions are called labeled policy expressions.

Expressiveness Analysis with Respect to First-order Logic  The basic core of this algebra captures only a strict subset of FOL  Equivalence Let E be a policy expression, and F be a formula in L with one free variable x. We say that E and F are equivalent if and only if for all environments e defined for all free identifiers of E, and for all relations satisfy

Evaluation with Respect to the Desiderata (1)  Heterogeneous policies can be supported either by exploiting the algebra constructs to represent the different policies or by referring to heterogeneous policies through policy identifiers then interpreted by means of wrappers.  Unknown policies are supported by means of policy identifiers that can remain unbound in the environment.  Interference of program rules and authorizations coming from different policies is controlled by restricting rule application to specific policies by means of the closure construct.

Evaluation with Respect to the Desiderata (2)  Expressiveness is achieved by the different operators that easily allow the formulation of protection restrictions as illustrated in the examples and discussions contained herein.  Different abstraction levels are naturally supported by the component-based approach.  Formal semantics can be exploited to reason about properties of the specifications.

Concluding Remarks  Main contributions: Analyzed the problem of composing security policies in a modular and incremental fashion. Identified six desiderata for policy composition framework Proposed an algebra of security policies and a composition language. Proposed an implementation approach based on logic programming and partial evaluation techniques. Provided and extensive preliminary analysis of the algebra.