A nonmonotonic modal authorization logic for pervasive computing

Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are provided to human users in a dynamic manner. These features suggest the need for the modification of existing logics in two directions. First, users' capabilities being intrinsic to pervasive computing should be incorporated into the underlying modal logic. Second, the logic should be equipped with appropriate machinery so that it can deal with the imperfection in the information required for authorization. This paper has contributions in both directions. We present a logic that reflects how the capabilities of users change in different contexts. Nonmonotonicity is then added to the logic so that earlier decisions based on imperfect information can be retracted. The usefulness of our formulation is demonstrated through the added capacity it provides for specifying and enforcing access control policies in real-life environments. We also present a minimal model semantics that reflects nonmonotonicity through the way it gives meaning to the formulas of the logic. Finally, we propose a sound and complete decision procedure based on semantic tableaux. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Insup Lee,et al.  Permission to speak: A logic for access control and conformance , 2011, J. Log. Algebraic Methods Program..

[2]  Martín Abadi Logic in Access Control (Tutorial Notes) , 2009, FOSAD.

[3]  Grigori Schwarz,et al.  Minimal model semantics for nonmonotonic modal logics , 1992, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science.

[4]  Fabio Massacci,et al.  Strongly Analytic Tableaux for Normal Modal Logics , 1994, CADE.

[5]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[6]  Fabio Massacci,et al.  Single Step Tableaux for Modal Logics , 2000, Journal of Automated Reasoning.

[7]  M. Fitting Proof Methods for Modal and Intuitionistic Logics , 1983 .

[8]  Robert C. Moore Semantical Considerations on Nonmonotonic Logic , 1985, IJCAI.

[9]  Mehran S. Fallah,et al.  A logical view of nonmonotonicity in access control , 2011, Proceedings of the International Conference on Security and Cryptography.

[10]  Drew McDermott,et al.  Nonmonotonic Logic II: Nonmonotonic Modal Theories , 1982, JACM.

[11]  Liang Zhang,et al.  Research on Delegation Authorization Model Based on TRBAC and Attribute , 2012 .

[12]  Emin Gün Sirer,et al.  Nexus authorization logic (NAL): Design rationale and applications , 2011, TSEC.

[13]  Minyi Guo,et al.  Decentralized checking of context inconsistency in pervasive computing environments , 2011, The Journal of Supercomputing.

[14]  Deepak Garg,et al.  New Modalities for Access Control Logics: Permission, Control and Ratification , 2011, STM.

[15]  Fabio Massacci,et al.  Tableaux Methods for Access Control in Distributed Systems , 1997, TABLEAUX.

[16]  Vladimir Lifschitz,et al.  Twelve Definitions of a Stable Model , 2008, ICLP.

[17]  Dai You Jiang Pervasive Computing Architecture, Key Technologies and Issues Facing , 2011 .

[18]  Rajeev Goré,et al.  Tableau Methods for Modal and Temporal Logics , 1999 .

[19]  Arkady B. Zaslavsky,et al.  Formal verification of context and situation models in pervasive computing , 2013, Pervasive Mob. Comput..