Term rewriting for access control

  • Authors:
  • Steve Barker;Maribel Fernández

  • Affiliations:
  • Dept. of Computer Science, King's College London, Strand, London, U.K.;Dept. of Computer Science, King's College London, Strand, London, U.K.

  • Venue:
  • DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for proving properties of an access control policy. We focus on two kinds of access control models: discretionary models, based on access control lists (ACLs), and role-based access control (RBAC) models. For RBAC models, we show that we can specify several variants, including models with role hierarchies, and constraints and support for security administrator review querying.