Cassandra: Distributed access control policies with tunable expressiveness

被引:65
作者
Becker, MY [1 ]
Sewell, P [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge, England
来源
FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS | 2004年
关键词
D O I
10.1109/POLICY.2004.1309162
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarchy or role delegation occur in practice in many subtle variants. A policy specification language should therefore be able to express this variety of features smoothly, rather than add them as specific features in an ad hoc way, as is the case in many existing languages. We present Cassandra, a role-based trust management system with an elegant and readable policy specification language based on Datalog with constraints. The expressiveness (and computational complexity) of the language can be adjusted by choosing an appropriate constraint domain. With just five special predicates, we can easily express a wide range of policies including role hierarchy, role delegation, separation of duties, cascading revocation, automatic credential discovery and trust negotiation. Cassandra has a formal semantics for query evaluation and for the access control enforcement engine. We use a goal-oriented distributed policy evaluation algorithm that is efficient and guarantees termination. Initial performance results for our prototype implementation have been promising.
引用
收藏
页码:159 / 168
页数:10
相关论文
共 23 条
[1]  
[Anonymous], **DROPPED REF**
[2]  
[Anonymous], 2002, Introduction to Constraint Databases
[3]  
[Anonymous], P 1 ACM WORKSH ROL B
[4]  
[Anonymous], ACM T INFORM SYST, DOI DOI 10.1145/605434.605435
[5]  
BAKER N, 1993, AUSTR COMPUTER SCI C, P321
[6]  
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[7]  
BECKER MY, 2004, IN PRESS P 17 IEEE C
[8]  
Blaze M, 1999, LECT NOTES COMPUT SC, V1550, P59
[9]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[10]  
CLARKE D, 2001, J COMPUTER SECURITY, V9, P2852