Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular way using techniques developed in the field of term rewriting, focusing especially on the use of rewriting strategies. Term rewriting supports a formalization of access control with a clear declarative semantics based on equational logic and an operational semantics guided by strategies. Wellestablished term rewriting techniques allow us to check properties of policies such as the absence of conflicts and the property of always returning a decision. A rich language for expressing rewriting strategies is used to define a theory of modular construction of policies, in which we can better understand the preservation of properties of policies under composition. The robustness of the approach is illustrated on the composition operators of XACML. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Dougherty, D. J., Kirchner, C., Kirchner, H., & De Oliveira, A. S. (2007). Modular access control via strategic rewriting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4734 LNCS, pp. 578–593). Springer Verlag. https://doi.org/10.1007/978-3-540-74835-9_38
Mendeley helps you to discover research relevant for your work.