Entry Becker:2010:LSM from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Becker:2010:LSM,
  author =       "Moritz Y. Becker and Sebastian Nanz",
  title =        "A logic for state-modifying authorization policies",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "3",
  pages =        "20:1--20:??",
  month =        jul,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1805974.1805976",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jul 28 14:57:15 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Administering and maintaining access control systems
                 is a challenging task, especially in environments with
                 complex and changing authorization requirements. A
                 number of authorization logics have been proposed that
                 aim at simplifying access control by factoring the
                 authorization policy out of the hard-coded resource
                 guard. However, many policies require the authorization
                 state to be updated after a granted access request, for
                 example, to reflect the fact that a user has activated
                 or deactivated a role. Current authorization languages
                 cannot express such state modifications; these still
                 have to be hard-coded into the resource guard. We
                 present a logic for specifying policies where access
                 requests can have effects on the authorization state.
                 The logic is semantically defined by a mapping to
                 Transaction Logic. Using this approach, updates to the
                 state are factored out of the resource guard, thus
                 enhancing maintainability and facilitating more
                 expressive policies that take the history of access
                 requests into account. We also present a sound and
                 complete proof system for reasoning about sequences of
                 access requests. This gives rise to a goal-oriented
                 algorithm for finding minimal sequences that lead to a
                 specified target authorization state.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "access control; Authorization; Hoare logic; policy",
}

Related entries