Skip to main content

Types for Role-Based Access Control of Dynamic Web Data

  • Conference paper
Functional and Constraint Logic Programming (WFLP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6559))

Included in the following conference series:

Abstract

We introduce a role-based access control calculus for modelling dynamic web data and a corresponding type system. It is an extension of the X calculus proposed by Gardner and Maffeis. In our framework, a network is a parallel composition of locations, where each location contains processes with roles and a data tree whose edges are associated with roles. Processes can communicate, migrate from a location to another, use the data, change the data and the roles in the local tree. In this way, we obtain a model that controls process access to data. We propose a type system which ensures that a specified network policy is respected during computations. Finally, we show that our calculus obeys the following security properties: (1) all data trees and processes with roles in a location agree with the location policy; (2) a process can migrate only to a location with whose policy it agrees; (3) a process with roles can read and modify only data which are accessible to it; (4) a process with roles can enable and disable roles in agreement with the location policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Braghin, C., Gorla, D., Sassone, V.: Role-based access control for a distributed calculus. Journal of Computer Security 14(2), 113–155 (2006)

    Article  Google Scholar 

  2. Bugliesi, M., Castagna, G., Crafa, S.: Access control for mobile agents: The calculus of boxed ambients. ACM Transactions on Programming Languages and Systems 26(1), 57–124 (2004)

    Article  Google Scholar 

  3. Bugliesi, M., Crafa, S., Merro, M., Sassone, V.: Communication and mobility control in boxed ambients. Information and Computation 202(1), 39–86 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  4. Cardelli, L., Ghelli, G., Gordon, A.D.: Types for the ambient calculus. Information and Computation 177(2), 160–194 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Castagna, G., Vitek, J., Nardelli, F.Z.: The Seal calculus. Information and Computation 201(1), 1–54 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  6. Compagnoni, A.B., Gunter, E.L., Bidinger, P.: Role-based access control for boxed ambients. Theoretical Computer Science 398(1-3), 203–216 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  7. Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E.: Types for ambient and process mobility. Mathematical Structures in Computer Science 18, 221–290 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. Dezani-Ciancaglini, M., Ghilezan, S., Pantovic, J., Varacca, D.: Security types for dynamic web data. Theoretical Computer Science 402(2-3), 156–171 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  9. Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security 2(1), 34–64 (1999)

    Article  Google Scholar 

  10. Ferraiolo, D.F., Kuhn, D.R., Sandhu, R.S.: Rôle-based access control. In: NIST-NSA National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  11. Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    Article  Google Scholar 

  12. Gardner, P., Maffeis, S.: Modelling dynamic web data. Theoretical Computer Science 342(1), 104–131 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  13. Garralda, P., Bonelli, E., Compagnoni, A., Dezani-Ciancaglini, M.: Boxed ambients with communication interfaces. Mathematical Structures in Computer Science 17, 1–59 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. Logical Methods in Computer Science 1(3:2), 331–353 (2005)

    MathSciNet  MATH  Google Scholar 

  15. Hennessy, M.: A Distributed Pi-calculus. Cambridge University Press, Cambridge (2007)

    Book  MATH  Google Scholar 

  16. Hennessy, M., Rathke, J., Yoshida, N.: SafeDpi: A language for controlling mobile code. Acta Informatica 42(4-5), 227–290 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  17. Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation 173(1), 82–120 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  18. Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)

    Article  Google Scholar 

  19. Levi, F., Sangiorgi, D.: Controlling interference in ambients. Transactions on Programming Languages and Systems 25(1), 1–69 (2003)

    Article  MATH  Google Scholar 

  20. Maffeis, S., Gardner, P.: Behavioural equivalences for dynamic Web data. Journal of Logic and Algebraic Programming 75(1), 86–138 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  21. Merro, M., Hennessy, M.: A bisimulation-based semantic theory of safe ambients. ACM Transactions on Programming Languages and Systems 28(2), 290–330 (2006)

    Article  Google Scholar 

  22. Milner, R.: Communicating and Mobile Systems: the π-Calculus. Cambridge University Press, Cambridge (1999)

    MATH  Google Scholar 

  23. Osborn, S., Sandhu, R.S., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2), 85–106 (2000)

    Article  Google Scholar 

  24. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dezani-Ciancaglini, M., Ghilezan, S., Jakšić, S., Pantović, J. (2011). Types for Role-Based Access Control of Dynamic Web Data. In: Mariño, J. (eds) Functional and Constraint Logic Programming. WFLP 2010. Lecture Notes in Computer Science, vol 6559. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20775-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20775-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20774-7

  • Online ISBN: 978-3-642-20775-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics