Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/998684.1006922guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

Published: 07 June 2004 Publication History

Abstract

We study the specification of access control policy inlarge-scale distributed systems. Our work on real-worldpolicies has shown that standard policy idioms such as rolehierarchy or role delegation occur in practice in many subtle variants. A policy specification language should therefore be able to express this variety of features smoothly,rather than add them as specific features in an ad hoc way,as is the case in many existing languages.We present Cassandra, a role-based trust managementsystem with an elegant and readable policy specificationlanguage based on Datalog with constraints. The expressiveness (and computational complexity) of the languagecan be adjusted by choosing an appropriate constraint domain. With just five special predicates, we can easily express a wide range of policies including role hierarchy,role delegation, separation of duties, cascading revocation, automatic credential discovery and trust negotiation. Cassandra has a formal semantics for query evaluation andfor the access control enforcement engine. We use a goal-oriented distributed policy evaluation algorithm that is efficient and guarantees termination. Initial performance results for our prototype implementation have been promising.

Cited By

View all
  • (2018)DatalogDeclarative Logic Programming10.1145/3191315.3191317(3-100)Online publication date: 1-Sep-2018
  • (2016)Efficient Network Path Verification for Policy-routedQueriesProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857715(319-328)Online publication date: 9-Mar-2016
  • (2015)Schematizing Trust in Named Data NetworkingProceedings of the 2nd ACM Conference on Information-Centric Networking10.1145/2810156.2810170(177-186)Online publication date: 30-Sep-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
POLICY '04: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
June 2004
ISBN:076952141X

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 June 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)DatalogDeclarative Logic Programming10.1145/3191315.3191317(3-100)Online publication date: 1-Sep-2018
  • (2016)Efficient Network Path Verification for Policy-routedQueriesProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857715(319-328)Online publication date: 9-Mar-2016
  • (2015)Schematizing Trust in Named Data NetworkingProceedings of the 2nd ACM Conference on Information-Centric Networking10.1145/2810156.2810170(177-186)Online publication date: 30-Sep-2015
  • (2015)A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric CollaborationsProceedings of the 11th International Conference on Information Systems Security - Volume 947810.1007/978-3-319-26961-0_15(243-262)Online publication date: 16-Dec-2015
  • (2014)Sophisticated Access Control via SMT and Logical FrameworksACM Transactions on Information and System Security10.1145/259522216:4(1-31)Online publication date: 1-Apr-2014
  • (2014)COASTmed: software architectures for delivering customizable, policy-based differential web servicesCompanion Proceedings of the 36th International Conference on Software Engineering10.1145/2591062.2591083(634-637)Online publication date: 31-May-2014
  • (2013)Belief semantics of authorization logicProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516667(561-572)Online publication date: 4-Nov-2013
  • (2013)Automated analysis of rule-based access control policiesProceedings of the 7th workshop on Programming languages meets program verification10.1145/2428116.2428125(47-56)Online publication date: 22-Jan-2013
  • (2013)An ontology-based approach to automated trust negotiationComputer Standards & Interfaces10.1016/j.csi.2013.03.00336:1(219-230)Online publication date: 1-Nov-2013
  • (2012)Information flow in trust management systemsJournal of Computer Security10.5555/2595038.259504120:6(677-708)Online publication date: 1-Nov-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media