rewrite specifications of access control policies in
play

Rewrite Specifications of Access Control Policies in Distributed - PowerPoint PPT Presentation

Rewrite Specifications of Access Control Policies in Distributed Environments C. Bertolissi and M. Fernndez LIF , Marseille & Kings College London WTS2010, Nancy C. Bertolissi, M. Fernndez () Term rewriting for Access Control


  1. Rewrite Specifications of Access Control Policies in Distributed Environments C. Bertolissi and M. Fernández LIF , Marseille & King’s College London WTS’2010, Nancy C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 1 / 28

  2. Authorisation models and policies Access control is of fundamental importance in computer security. Formal specifications of access control models and policies make it possible to • compare policies rigorously, • understand the consequences of modifying policies, and • prove properties of policies. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 2 / 28

  3. Context Over the last few years, a wide range of access control models have been developed : ACL, DAC, MAC, RBAC, EBAC, . . . In contrast, recently a general meta-model for access control based on the primitive notion of category has been proposed [Sacmat09]. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 3 / 28

  4. Authorisation models and policies The meta-model approach has advantages : • identify a core set of principles of access control, which can be specialised for domain-specific applications. • abstract away many of the complexities that are found in specific access control models ; • help to simplify the task of policy writing. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 4 / 28

  5. Motivations We propose a formal specification of Barker’s meta-model using term rewriting. This choice has several motivations : • Expressivity : rewriting systems have been used to specify, in a uniform way, various computational paradigms. • A well-developed theory : rewriting techniques can be used to prove properties of policies specified as rewriting systems. • Availability of tools such as ELAN, MAUDE, CiME, etc. for rapid prototyping of access policies. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 5 / 28

  6. Contributions • a declarative, rewrite-based specification of the category-based access control model, together with a formal operational semantics. • a technique to prove totality and consistency of access control policies. • the encoding of well-known access control models (H-RBAC, MAC, DAC and DEBAC models) in the meta-model, to demonstrate its expressive power. • the axiomatisation of the meta-model for taking into account the requirements of distributed systems, together with a rewrite-based operational semantics. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 6 / 28

  7. Overview • The Category-based meta-model M . • Introduction to Term rewriting. • Rewrite-based specification of M : • definition, • request evaluation, • properties • expressive power. • The Distributed version of M . • Conclusions and future work C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 7 / 28

  8. The meta-model M : notion of category A key aspect the meta-model is the notion of a category. A category is a class, a domain to which entities or concepts belong. We regard categories as a primitive concept. Classic types of groupings used in access control, like a role , a security clearance , a discrete measure of trust , etc, are particular instances of the notion of category. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 8 / 28

  9. Features of the AC meta-model Entities in the meta-model M are denoted uniquely by constants in a many sorted domain of discourse, including : • A countable set C of categories : c 0 , c 1 , . . . . • A countable set P of principal identifiers : p 1 , p 2 , . . . . • A countable set A of named actions : a 1 , a 2 , . . . . • A countable set R of resources : r 1 , r 2 , . . . . • A finite set A uth of answers : e.g. grant , deny. Additionally we may have : • A countable set S of situational identifiers (locations, system states,. . . ) : s 0 , s 1 , . . . . • A countable set E of event identifiers : e 1 , e 2 , . . . . • A countable set T of time points . Entities are assigned to distinct classes or groups called categories. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 9 / 28

  10. Relationships between entities • Principal-category assignment PCA : ( p , c ) ∈ PCA iff a principal p ∈ P is assigned to the category c ∈ C . • Permissions ARCA : ( a , r , c ) ∈ ARCA iff the action a ∈ A on resource r ∈ R can be performed by principals assigned to the category c ∈ C . • Authorisations PAR : ( p , a , r ) ∈ PAR iff a principal p ∈ P can perform the action a ∈ A on the resource r ∈ R . • Banned actions on resources BARCA : ( a , r , c ) ∈ BARCA iff the action a ∈ A on resource r ∈ R is forbidden for principals assigned to the category c ∈ C . • Barred access BAR : ( p , a , r ) ∈ BAR iff performing the action a ∈ A on the resource r ∈ R is forbidden for the principal p ∈ P . C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 10 / 28

  11. Distributed version of M A distributed system is generally composed of several sites, with different policies in place at each site. We consider families of relations, e.g BAR s , PAR s , indexed by situational identifiers (i.e., sites). The relation PAR defining the global authorisation policy will be obtained by composing the local policies defined by the relations PAR s and BAR s . C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 11 / 28

  12. Axioms of Distributed M In any site s of the distributed system, the following axioms hold : ( b 1 ) ∀ p ∈ P , ∀ a ∈ A , ∀ r ∈ R , ∀ c ∈ C , ∀ s ∈ S ( p , c ) ∈ PCA s ∧ ( ∃ c ′ ∈ C , c ⊆ c ′ ∧ ( a , r , c ′ ) ∈ ARCA s ) ⇒ ( p , a , r ) ∈ PAR s ∀ p ∈ P , ∀ a ∈ A , ∀ r ∈ R , ∀ c ∈ C , ∀ s ∈ S ( c 1 ) ( p , c ) ∈ PCA s ∧ ( ∃ c ′ ∈ C , c ′ ⊆ c ∧ ( a , r , c ′ ) ∈ BARCA s ) ⇒ ( p , a , r ) ∈ BAR s ( d 1 ) ∀ p ∈ P , ∀ a ∈ A , ∀ r ∈ R , ∀ c ∈ C , ∀ s ∈ S ( p , c ) ∈ PCA s ∧ ( a , r , c ) �∈ ARCA s ∧ ( a , r , c ) �∈ BARCA s ⇒ ( p , a , r ) ∈ UNDET s ∀ s ∈ S , ARCA s ∩ BARCA s = ∅ ( e 1 ) C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 12 / 28

  13. Axioms of Distributed M The axioms below describe the global authorisation relation in terms of the local policies defined at each site : ( f 1 ) ∀ p ∈ P , ∀ a ∈ A , ∀ r ∈ R , ( p , a , r ) ∈ OP par ( {PAR s , BAR s | s ∈ S } ) ⇒ ( p , a , r ) ∈ PAR ( g 1 ) ∀ p ∈ P , ∀ a ∈ A , ∀ r ∈ R , ( p , a , r ) ∈ OP bar ( {PAR s , BAR s | s ∈ S } ) ⇒ ( p , a , r ) ∈ BAR PAR ∩ BAR = ∅ ( h 1 ) The final authorisation is computed specialising the definition of the operators OP par and OP bar . For example, • OP bar = ( BAR s ∨ BAR t ) and OP par = (( PAR s / BAR t ) ∨ ( PAR t / BAR s )) specifies a combination giving priority to deny • OP par = PAR ς and OP bar = BAR ς if the system has a central policy at site ς C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 13 / 28

  14. Operational semantics The formal specification of the operational semantics of the meta-model is given using term rewriting . This choice has several motivations : • Expressivity : rewriting systems have been used to specify, in a uniform way, various computational paradigms. • A well-developed theory : rewriting techniques can be used to prove properties of policies specified as rewriting systems. • Availability of tools such as ELAN, MAUDE, CiME, etc. for rapid prototyping of access policies. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 14 / 28

  15. Term Rewrite systems Term rewrite systems (TRSs) are defined by a set of terms and a set of rewrite rules that are used to ’reduce’ terms. The set of terms T ( F , X ) is built up from a signature F and a set of variables X . The set of rewrite rules is of the form R = { l i → r i } i ∈ I where l i , r i ∈ T ( F , X ) , l i �∈ X , and Var ( r i ) ⊆ Var ( l i ) . → t ′ and its reflexive transitive closure We denote a rewrite step by t − → ∗ t ′ . by t − If a term t cannot be reduced further, we say t is in normal form . C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 15 / 28

  16. Example : lists of naturals F = { 0 , s } ∪ { nil , cons , Length } T = ( F , { x , y , . . . } ) � R 0 : Length ( nil ) → 0 R = R 1 : Length ( cons ( x , l )) → S ( Length ( l )) Term reduction sequence : Length ( cons ( 0 , cons ( S ( 0 ) , nil ))) → R 1 S ( Length ( cons ( S ( 0 ) , nil )) → R 1 S ( S ( Length ( nil ))) → R 0 S ( S ( 0 )) C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 16 / 28

  17. Distributed Rewriting Distributed term rewrite systems (DTRSs) are TRSs where rules are partitioned into modules , each associated with a unique identifier, and function symbols are annotated with such identifiers. In a DTRS, we can associate a module to each site of a distributed system : we may write f ν to refer to the definition of the function symbol f in the site ν . We assume that each module has a unique identifier ; If a symbol is used in a rule without a site annotation, we assume the function is defined locally. C. Bertolissi, M. Fernández () Term rewriting for Access Control Octobre 2010 17 / 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend