A Datalog Framework for Modeling Relationship-based Access Control Policies

被引:21
|
作者
Pasarella, Edelmira [1 ]
Lobo, Jorge [2 ]
机构
[1] Univ Politecn Cataluna, Comp Sci Dept, Barcelona, Spain
[2] Univ Pompeu Fabra, Inst Catalana Recerca & Estudis Avancats ICREA, Barcelona, Spain
关键词
Relationship-based Access Control; security and privacy policies; Datalog; EXPRESSIVE POWER; COMPLEXITY;
D O I
10.1145/3078861.3078871
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relationships like friendship to limit access to resources have been part of social network applications since their beginnings. Describing access control policies in terms of relationships is not particular to social networks and it arises naturally in many situations. Hence, we have recently seen several proposals formalizing different Relationship-based Access Control (ReBAC) models. In this paper, we introduce a class of Datalog programs suitable for modeling ReBAC and argue that this class of programs, that we called ReBAC Datalog policies, provides a very general framework to specify and implement ReBAC policies. To support our claim, we first formalize the merging of two recent proposals for modeling ReBAC, one based on hybrid logic and the other one based on path regular expressions. We present extensions to handle negative authorizations and temporal policies. We describe mechanism for policy analysis, and then discuss the feasibility of using Datalog-based systems as implementations.
引用
收藏
页码:91 / 102
页数:12
相关论文
共 50 条
  • [31] Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications
    Arora, Chahal
    Rizvi, Syed Zain R.
    Fong, Philip W. L.
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 223 - 234
  • [32] A graph-based framework for the analysis of access control policies
    Alves, Sandra
    Fernandez, Maribel
    THEORETICAL COMPUTER SCIENCE, 2017, 685 : 3 - 22
  • [33] An efficient preprocessing stage for the relationship-based clustering framework
    Bilgin, Turgay Tugay
    Camurcu, Ali Yilmaz
    INTELLIGENT DATA ANALYSIS, 2010, 14 (06) : 731 - 748
  • [34] A Relationship-based VM Placement Framework of Cloud Environment
    Zhang, Xiadong
    Zhang, Ying
    Chen, Xing
    Liu, Kai
    Huang, Gang
    Zhan, Jianfeng
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 124 - 133
  • [35] Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration
    Ahmed, Tahmina
    Patwa, Farhan
    Sandhu, Ravi
    PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 297 - 304
  • [36] Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 646 - 655
  • [37] Polisma - A Framework for Learning Attribute-Based Access Control Policies
    Abu Jabal, Amani
    Bertino, Elisa
    Lobo, Jorge
    Law, Mark
    Russo, Alessandra
    Calo, Seraphin
    Verma, Dinesh
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
  • [38] MDAOrBAC: An MDA Security Framework Based OrBAC Access Control Policies
    Kaddani, Aziz
    Baina, Amine
    Echabbi, Loubna
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 437 - 445
  • [39] ProFact: A Provenance-Based Analytics Framework for Access Control Policies
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1914 - 1928
  • [40] A framework for automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221