Calculi for Access Control. Mart ί n Abadi University of California, Santa Cruz and Microsoft Research, Silicon Valley. The access control model. Elements: Objects or resources Requests Sources for requests, called principals A reference monitor to decide on requests.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
University of California, Santa CruzandMicrosoft Research, Silicon Valley
A says s holds at world w iff s holds at world w’ for every w’ such that w A w’
A ∧ B speaks for A, etc.
Phone discovers door
I can prove that with any of
1)Jon speaksfor Mike.Student
2)Jon speaksfor Mike.Admin
3)Jon speaksfor Mike.Wife
Hmm, I can’t prove that. I’ll ask Mike’s phone for help.
Jon speaksfor Mike.Student
Jon says Goal(D208.open) Mike says Goal(D208.open)
Several languages rely on logics for access control and on logic programming:
“speaks for” plays a role in other systems:
(Zdancewic recently checked subject reduction and progress properties for this semantics in Twelf.)
These follow from general rules, apparently without annoying consequences.