skip to main content
article
Open Access

A calculus for access control in distributed systems

Published:01 September 1993Publication History
Skip Abstract Section

Abstract

We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, either on his own or on someone else's behalf. We also provide a logical language for accesss control lists and theories for deciding whether requests should be granted.

References

  1. 1 ABADI, M., AND PLOTKIN, G. A logicat view of composition. Theor. Comput. $cu 116, 1 (June 1993), 3 30. Google ScholarGoogle Scholar
  2. 2 ABADI, M ,BURROWS, M., KAUFMAN, C., AND LAMPSON, B. Authentication and delegation with smart-cards. In Theoret~cal Aspects of Computer Software, Springer-Verlag Lecture Notes in Computer Science 526, Sept. 1991, 326-345. Google ScholarGoogle Scholar
  3. 3 ANDR~KA, H. Representations of distributive lattice-ordered semigroups with binary relations. Manuscript, Aug. 1989.Google ScholarGoogle Scholar
  4. 4 BURROWS, M., ABADI, M., AND NEEDHAM, R.M. A logic of authentication. Proceedmgs of the Royal Society of London A 326 (1989), 233-271.Google ScholarGoogle Scholar
  5. 5 CCITT. CCITT Blue Book, Recommendation X.509 and ISO 9594-8: The directoryauthentication framework. Geneva, March 1988.Google ScholarGoogle Scholar
  6. 6 CHANDRA, A., KOZEN, D., AND STOCKMEYER~ L. Alternation. J. A~M 28, 1 (Jan. 1981), 114 133. Google ScholarGoogle Scholar
  7. 7 DAM, M. Relevance logic and concurrent computation. In Proceedings of the Thwd IEEE Symposium on Log~e ~n Computer Science (July 1988), 178-185.Google ScholarGoogle Scholar
  8. 8 NATIONAL BUREAU OF STANDARDS. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46. Washington D.C , Jan. 1977.Google ScholarGoogle Scholar
  9. 9 D~Frm, W., AND HELLMAN, M. New directions m cryptography. IEEE Trans. Inf. Theor. IT-22, 6 (Nov. 1976), 644 654.Google ScholarGoogle Scholar
  10. 10 FABRY, R Capability-based addressing. Commun. ACM 17, 7 (July 1974), 403 412. Google ScholarGoogle Scholar
  11. 11 GASSER, M., GOLDSTEIN, A., KAUFMAN, C., AND LAMPSON, B. The Digital Distrihuted System Security Architecture. In Proceedzngs of thc 1989 Natwnal Computer Secumty Conference (Oct. 1989), 305-319.Google ScholarGoogle Scholar
  12. 12 (~'ASSER, M., AND i\~CDERMOTT, E. An architecture for practical delegation in a distributed system. In Proceedmgs of the 1990 IEEE Symposium on Secumty and Prwacy (May 1990), 20 30Google ScholarGoogle Scholar
  13. 13 GIRARD, J.-Y. Linear logic. Theor. Comput. $cu 50 (1987), 1-102. Google ScholarGoogle Scholar
  14. 14 HUGttES, G E , AND CRESSWELL, NI J An Introduction to Modal Logtc. Methuen, New York, 1968.Google ScholarGoogle Scholar
  15. 15 KOHL, J., NEUMAN, C., AND STEINER, J. The Kerberos network authentieation service (version 5, draft 3). Available by anonymous FTP from athena-dist.mit.edu, as /pub/doc/kerberos/V5DRAFT3-RFC.{PS,TXT}, Oct. 1990.Google ScholarGoogle Scholar
  16. 16 KOZEN, D A completeness theorem for Kleene algebras and the algebra of regular events. Cornell TR90-1123, May 1990.Google ScholarGoogle Scholar
  17. 17 LAMPSON, B., ABADI, M., BURROWS, M.~ AND WOBBER, E. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. 10, 4 (November 1992), 265-310. Google ScholarGoogle Scholar
  18. 18 LEVY, H. Capab,lity-based Computer Systems. Digital Press, 1983. Google ScholarGoogle Scholar
  19. 19 MILLEa, S P., NEUMAN, C., SCHILLER, J.I.~ AND SALTZER, J.H. Kerberos authentication and authorization system. In Projcct Athena Techmcal Plan, Section E.2.1, MIT, July 1987.Google ScholarGoogle Scholar
  20. 20 NEEDHAM, R.}~{ ~ AND SCHROEDEP~, M.D. Usmg encryption for authentication in large networks of computers. Commun. ACM 21~ 12 (Dee. 1978), 993-999. Google ScholarGoogle Scholar
  21. 21 PRATT, V. Dynamie algebras as a well-behaved fragment of relation algebras. In Algebra~c Logic and Umversal Algebra in Computer Science, Springer-Verlag Lecture Notes in Computer Science 425, 1990, 77-110. Google ScholarGoogle Scholar
  22. 22 RIVEST, R.L , SHAMIR, A., AND ADLEMAN, L. A method for obtainmg digital signatures and public-key cryptosystems. Comraun. ACM 21, 2 (Feb. 1978), 120-126 Google ScholarGoogle Scholar
  23. 23 SALTZER, J., AND SCHROEDER, ~/i. The protection of information in computer systems. Proc. IEEE ~3, 9 (Sept. 1975), 1278 1308.Google ScholarGoogle Scholar
  24. 24 SOLLTNS, K Cascaded authentlcat~on. In Pvoceedmgs of the 1988 IEEE Symposium o~ Securzty and Pr~vacy (April 1988), 156-163.Google ScholarGoogle Scholar
  25. 25 VICKERS, S. Samson Abramsky on linear process logics. Foundatlon Workshop Notes, Oct - Nov. 1988.Google ScholarGoogle Scholar
  26. 26 YETTER, D N.Quantales and (noncommutatlve) linear logic. J. Symb Log~e 55, 1 (March 1990), 41 64.Google ScholarGoogle Scholar

Index Terms

  1. A calculus for access control in distributed systems

                  Recommendations

                  Reviews

                  Ernst L. Leiss

                  One of the major problems in the security of computer systems is access control. Its importance is increased in distributed systems. Thus, access control mechanisms in distributed systems are vital, but they are difficult to implement and even more difficult to verify. Building on work on access control in centralized systems, this paper defines a logical calculus that can be used to derive relations between users or resources in distributed computing systems. A logical language for access control lists is developed. An important aspect of this language is theories for deciding whether requests for access to resources are to be granted under a given control framework. Of particular interest is the formal treatment of delegation. This rather long paper succeeds in giving a good deal of motivation and interesting discussion in a form that is accessible to non logicians. Nevertheless, to appreciate the more technical aspects of the paper requires a working knowledge of logic and formal semantics.

                  Access critical reviews of Computing literature here

                  Become a reviewer for Computing Reviews.

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image ACM Transactions on Programming Languages and Systems
                    ACM Transactions on Programming Languages and Systems  Volume 15, Issue 4
                    Sept. 1993
                    168 pages
                    ISSN:0164-0925
                    EISSN:1558-4593
                    DOI:10.1145/155183
                    Issue’s Table of Contents

                    Copyright © 1993 ACM

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 September 1993
                    Published in toplas Volume 15, Issue 4

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader