【24h】

Model-Checking Access Control Policies

机译:模型检查访问控制策略

获取原文
获取原文并翻译 | 示例

摘要

We present a model of access control which provides finegrained data-dependent control, can express permissions about permissions, can express delegation, and can describe systems which avoid the root-bottleneck problem. We present a language for describing goals of agents; these goals are typically to read or write the values of some resources. We describe a decision procedure which determines whether a given coalition of agents has the means (possibly indirectly) to achieve its goal. We argue that this question is decidable in the situation of the potential intruders acting in parallel with legitimate users and taking whatever temporary opportunities the actions of the legitimate users present. Our technique can also be used to synthesise finite access control systems, from an appropriately formulated logical theory describing a high-level policy.
机译:我们提出了一种访问控制模型,该模型提供了与数据相关的细粒度控制,可以表达有关权限的权限,可以表达委派,并可以描述避免出现根瓶颈问题的系统。我们提供一种语言来描述代理商的目标;这些目标通常是读取或写入某些资源的值。我们描述了一种决策程序,该程序确定给定的代理人员联盟是否具有(可能间接)实现其目标的手段。我们认为,在潜在的入侵者与合法用户并行行动并利用合法用户所采取的任何临时机会的情况下,这个问题是可以确定的。我们的技术还可以用于根据描述高级策略的适当公式化的逻辑理论来合成有限的访问控制系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号