A Datalog Framework for Modeling Relationship-based Access Control Policies

被引:21
|
作者
Pasarella, Edelmira [1 ]
Lobo, Jorge [2 ]
机构
[1] Univ Politecn Cataluna, Comp Sci Dept, Barcelona, Spain
[2] Univ Pompeu Fabra, Inst Catalana Recerca & Estudis Avancats ICREA, Barcelona, Spain
来源
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17) | 2017年
关键词
Relationship-based Access Control; security and privacy policies; Datalog; EXPRESSIVE POWER; COMPLEXITY;
D O I
10.1145/3078861.3078871
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relationships like friendship to limit access to resources have been part of social network applications since their beginnings. Describing access control policies in terms of relationships is not particular to social networks and it arises naturally in many situations. Hence, we have recently seen several proposals formalizing different Relationship-based Access Control (ReBAC) models. In this paper, we introduce a class of Datalog programs suitable for modeling ReBAC and argue that this class of programs, that we called ReBAC Datalog policies, provides a very general framework to specify and implement ReBAC policies. To support our claim, we first formalize the merging of two recent proposals for modeling ReBAC, one based on hybrid logic and the other one based on path regular expressions. We present extensions to handle negative authorizations and temporal policies. We describe mechanism for policy analysis, and then discuss the feasibility of using Datalog-based systems as implementations.
引用
收藏
页码:91 / 102
页数:12
相关论文
共 28 条
  • [21] Development of a computational modeling laboratory for examining tobacco control policies: Tobacco Town
    Hammond, Ross A.
    Combs, Todd B.
    Mack-Crane, Austen
    Kasman, Matt
    Sorg, Amy
    Snider, Doneisha
    Luke, Douglas A.
    HEALTH & PLACE, 2020, 61
  • [22] Computational complexity of the problem of tree generation under fine-grained access control policies
    Moore, N.
    INFORMATION AND COMPUTATION, 2011, 209 (03) : 548 - 567
  • [23] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [24] Comparison of the Expressive Power of Language-Based Access Control Models
    Takata, Yoshiaki
    Seki, Hiroyuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 1033 - 1036
  • [25] Comparing administered and market-based water allocation systems through a consistent agent-based modeling framework
    Zhao, Jianshi
    Cai, Ximing
    Wang, Zhongjing
    JOURNAL OF ENVIRONMENTAL MANAGEMENT, 2013, 123 : 120 - 130
  • [26] Attribute-based low-complexity network access control policy with optimal grouping algorithm
    Mitani, Shohei
    Singh, Taniya
    Ghate, Nakul
    Ueda, Hirofumi
    IEICE COMMUNICATIONS EXPRESS, 2021, 10 (11): : 846 - 851
  • [27] Using system dynamics modeling to evaluate a community-based social marketing framework A computer simulation study
    Biroscak, Brian Joseph
    Bryant, Carol
    Khaliq, Mahmooda
    Schneider, Tali
    Panzera, Anthony Dominic
    Courtney, Anita
    Parvanta, Claudia
    Hovmand, Peter
    JOURNAL OF SOCIAL MARKETING, 2019, 9 (01) : 53 - 76
  • [28] An investigation of coupled natural human systems using a two-way coupled agent-based modeling framework
    Lin, Chung-Yi
    Yang, Y. C. Ethan
    Malek, Keyvan
    Adam, Jennifer C.
    ENVIRONMENTAL MODELLING & SOFTWARE, 2022, 155