On the Complexity of Linear Authorization Logics

被引:6
作者
Nigam, Vivek [1 ]
机构
[1] Univ Munich, Munich, Germany
来源
2012 27TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS) | 2012年
关键词
Authorization Logics; Complexity; Linear Logic; Subexponentials;
D O I
10.1109/LICS.2012.61
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Linear authorization logics (LAL) are logics based on linear logic that can be used for modeling effect-based authentication policies. LAL has been used in the context of the Proof-Carrying Authorization framework, where formal proofs are constructed in order for a principal to gain access to some resource elsewhere. This paper investigates the complexity of the provability problem, that is, determining whether a linear authorization logic formula is provable or not. We show that the multiplicative propositional fragment of LAL is already undecidable in the presence of two principals. On the other hand, we also identify a first-order fragment of LAL for which provability is PSPACE-complete. Finally, we argue by example that the latter fragment is natural and can be used in practice.
引用
收藏
页码:511 / 520
页数:10
相关论文
共 24 条
[1]   A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J].
ABADI, M ;
BURROWS, M ;
LAMPSON, B ;
PLOTKIN, G .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04) :706-734
[2]  
Abadi M., 2009, FOSAD
[3]  
Appel AW, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P52, DOI 10.1145/319709.319718
[4]  
Bowers K.D., 2007, NDSS
[5]   Relating state-based and process-based concurrency through linear logic (full-version) [J].
Cervesato, Iliano ;
Scedrov, Andre .
INFORMATION AND COMPUTATION, 2009, 207 (10) :1044-1077
[6]  
Chaudhuri K., 2009, EXPRESSIVITY 2 UNPUB
[7]  
Danos V., 1993, Computational Logic and Proof Theory. Third Kurt Godel Colloquium, KGC '93 Proceedings, P159, DOI 10.1007/BFb0022564
[8]   Vector addition tree automata [J].
de Groote, P ;
Guillaume, B ;
Salvati, S .
19TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, :64-73
[9]  
De Young H., 2009, WORKSH FDN COMP SEC
[10]  
Durgin N., 2004, Journal of Computer Security, V12, P247