skip to main content
10.1145/1455770.1455818acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

EON: modeling and analyzing dynamic access control systems with logic programs

Published:27 October 2008Publication History

ABSTRACT

We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully designed constructs that allow the introduction and transformation of new relations. For example, these constructs can model the creation of processes and objects, and the modification of their security labels at runtime. The information-flow properties of such systems can be analyzed by asking queries in this language. We show that query evaluation in EON can be reduced to decidable query satisfiability in a fragment of Datalog, and further, under some restrictions, to efficient query evaluation in Datalog.

We implement these reductions in our tool, and demonstrate its scope through several case studies.

In particular, we study in detail the dynamic access control models of the Windows Vista and Asbestos operating systems. We also automatically prove the security of a webserver running on Asbestos.

References

  1. M. Abadi and Z. Manna. Temporal logic programming. Journal of Symbolic Computing, 8(3):277--295, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Becker, C. Fournet, and A. Gordon. Design and semantics of a decentralized authorization language. In CSF'07: Computer Security Foundations Symposium. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corp., 1975.Google ScholarGoogle Scholar
  4. K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, MITRE Corp., 1977.Google ScholarGoogle Scholar
  5. B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In CSFW'01: Computer Security Foundations Workshop, page 82. IEEE, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for data-flow integrity on Windows Vista. In PLAS'08: Programming Languages and Analysis for Security, pages 89--100. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Chaudhuri, P. Naldurg, S. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. Technical Report MSR-TR-2008-21, Microsoft Research, 2008. See http://www.soe.ucsc.edu/avik/projects/EON/. Google ScholarGoogle Scholar
  8. M. Conover. Analysis of the windows vista security model. Symantec Report. Available at www.symantec.com/avcenter/reference/Windows_Vista_Security_Model_Analysis.pdf.Google ScholarGoogle Scholar
  9. D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236--243, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In IJCAR'06: International Joint Conference on Automated Reasoning, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In SOSP'05: Symposium on Operating Systems Principles, pages 17--30. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Y. Halevy, I. S. Mumick, Y. Sagiv, and O. Shmueli. Static analysis in datalog extensions. Journal of the ACM, 48(5):971--1012, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. On protection in operating systems. In SOSP'75: Symposium on Operating systems Principles, pages 14--24. ACM, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. W. Lampson. Protection. ACM Operating Systems Review, 8(1):18--24, Jan 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. Technical report, NSA, 1995.Google ScholarGoogle Scholar
  16. P. Naldurg, S. Schwoon, S. Rajamani, and J. Lambert. Netra: seeing through access control. In FMSE'06: Formal Methods in Security Engineering, pages 55--66. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. A. Orgun. On temporal deductive databases. Computational Intelligence, 12:235--259, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  18. B. Sarna-Starosta and S. D. Stoller. Policy analysis for security-enhanced linux. In WITS'04: Workshop on Issues in the Theory of Security, 2004. Available at http://www.cs.sunysb.edu/stoller/WITS2004.html.Google ScholarGoogle Scholar
  19. S. D. Stoller, P. Yang, C. Ramakrishnan, and M. I. Gofman. Efficient policy analysis for administrative role based access control. In CCS'07: Conference on Computer and Communications Security. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. D. Ullman. Principles of Database and Knowledge-base Systems, Volume II: The New Technologies. Computer Science Press, New York, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Zdancewic and A. C. Myers. Robust declassification. In CSFW'01: Computer Security Foundations Workshop, pages 5--16. IEEE, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. EON: modeling and analyzing dynamic access control systems with logic programs

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
                October 2008
                590 pages
                ISBN:9781595938107
                DOI:10.1145/1455770

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 27 October 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                CCS '08 Paper Acceptance Rate51of280submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader