Cassandra: distributed access control policies with tunable expressiveness
- 1 January 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarchy or role delegation occur in practice in many subtle variants. A policy specification language should therefore be able to express this variety of features smoothly, rather than add them as specific features in an ad hoc way, as is the case in many existing languages. We present Cassandra, a role-based trust management system with an elegant and readable policy specification language based on Datalog with constraints. The expressiveness (and computational complexity) of the language can be adjusted by choosing an appropriate constraint domain. With just five special predicates, we can easily express a wide range of policies including role hierarchy, role delegation, separation of duties, cascading revocation, automatic credential discovery and trust negotiation. Cassandra has a formal semantics for query evaluation and for the access control enforcement engine. We use a goal-oriented distributed policy evaluation algorithm that is efficient and guarantees termination. Initial performance results for our prototype implementation have been promising.Keywords
This publication has 15 references indexed in Scilit:
- Flexible access control policy specification with constraint logic programmingACM Transactions on Information and System Security, 2003
- Towards practical automated trust negotiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Datalog with Constraints: A Foundation for Trust Management LanguagesLecture Notes in Computer Science, 2002
- SD3: a trust management system with certified evaluationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Automated trust negotiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Distributed credential chain discovery in trust managementPublished by Association for Computing Machinery (ACM) ,2001
- KeyNote: Trust Management for Public-Key InfrastructuresLecture Notes in Computer Science, 1998
- Can we eliminate certificate revocation lists?Published by Springer Nature ,1998
- Constraint logic programming: a surveyThe Journal of Logic Programming, 1994