Abstract
We define a general typed language to deal with the notion of event in the context of access control systems. We distinguish between generic events, which represent the kind of actions that can occur in a system, and specific events, which represent actual occurrences of those kinds of actions. A relation is given associating specific to generic events, as well as a method for obtaining intervals from a history of events. We describe applications in access control systems with obligations.
S. Alves—Partially funded by FCT, Portuguese Foundation for Science and Technology within project UID/EEA/50014/2013.
S. Broda—Partially supported by CMUP (UID/MAT/00144/2013), which is funded by FCT (Portugal) with national (MEC) and European structural funds through the programs FEDER, under the partnership agreement PT2020.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alves, S., Degtyarev, A., Fernández, M.: Access control and obligations in the category-based metamodel: a rewrite-based semantics. In: Proietti, M., Seki, H. (eds.) LOPSTR 2014. LNCS, vol. 8981, pp. 148–163. Springer, Heidelberg (2015)
Baader, F., Nipkow, T.: Term rewriting and all that. Cambridge University Press, Great Britain (1998)
Barker, S.: Action-status access control. In: Proceedings of SACMAT 2007, pp. 195–204. ACM (2007)
Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of SACMAT 2009, pp. 187–196. ACM (2009)
Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inform. Syst. Secur. 12(1), 1:1–1:47 (2008)
Bell, D.E., Lapadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical report ESD-TR-75-306, The MITRE Corporation (1976)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inform. Syst. Secur. 4(3), 191–233 (2001)
Bertolissi, C., Fernández, M., Barker, S.: Dynamic event-based access control as term rewriting. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 195–210. Springer, Heidelberg (2007)
Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A.: Expressive policy analysis with enhanced system dynamicity. In: Proceedings of ASIACCS 2009, pp. 239–250. ACM (2009)
Davidson, D.: Essays on Actions and Events. Oxford University Press (2001)
Ferraiolo, D., Kuhn, R., Chandramouli, R.: Role-Based Access Control. Artech House, Norwood (2003)
Gelfond, M., Lobo, J.: Authorization and obligation policies in dynamic systems. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 22–36. Springer, Heidelberg (2008)
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531–546. Springer, Heidelberg (2007)
Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of CCS 2006, pp. 134–143. ACM (2006)
Kowalski, R.: Database updates in the event calculus. J. Logic Program. 12(1–2), 121–146 (1992)
Kowalski, R., Sadri, F.: A logic-based framework for reactive systems. In: Bikakis, A., Giurca, A. (eds.) RuleML 2012. LNCS, vol. 7438, pp. 1–15. Springer, Heidelberg (2012)
Kowalski, R., Sergot, M.: A Logic-based Calculus of Events. New Gen. Comput. 4(1), 67–95 (1986)
Miller, R., Shanahan, M.: The Event calculus in classical logic - alternative axiomatisations. Electron. Trans. Artif. Intell. 3(A), 77–105 (1999)
Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of SACMAT 2008, pp. 133–142. ACM (2008)
Ohori, A.: A polymorphic record calculus and its compilation. ACM Trans. Program. Lang. Syst. 17(6), 844–895 (1995)
Pontual, M., Chowdhury, O., Winsborough, W.H., Yu, T., Irwin, K.: On the management of user obligations. In: Proceedings of SACMAT 2011, pp. 175–184. ACM (2011)
Ranise, S., Truong, A.T., Armando, A.: Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of SACMAT 2014, pp. 103–114 (2014)
Ranise, S., Truong, A.T., Viganò, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of SAC 2015, pp. 2177–2184 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Alves, S., Broda, S., Fernández, M. (2015). A Typed Language for Events. In: Falaschi, M. (eds) Logic-Based Program Synthesis and Transformation. LOPSTR 2015. Lecture Notes in Computer Science(), vol 9527. Springer, Cham. https://doi.org/10.1007/978-3-319-27436-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-27436-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27435-5
Online ISBN: 978-3-319-27436-2
eBook Packages: Computer ScienceComputer Science (R0)