Pym, D;
Collinson, M;
McDonald, K;
(2015)
Layered graph logic as an assertion language for access control policy models.
Journal of Logic and Computation
, 27
(1)
pp. 41-80.
10.1093/logcom/exv020.
![]() |
Text
CollinsonMcDonaldPym-AccessControl.pdf Download (1MB) |
Abstract
We describe a uniform logical framework, based on a bunched logic that combines classical additives and very weak multiplicatives, for reasoning compositionally about access control policy models. We show how our approach takes account of the underlying system architecture, and so provides a way to identify and reason about how vulnerabilities may arise (and be removed) as a result of the architecture of the system. We consider, using frame rules, how local properties of access control policies are maintained as the system architecture evolves.
Type: | Article |
---|---|
Title: | Layered graph logic as an assertion language for access control policy models |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1093/logcom/exv020 |
Publisher version: | http://dx.doi.org/10.1093/logcom/exv020 |
Language: | English |
Additional information: | This is a pre-copyedited, author-produced PDF of an article accepted for publication in the Journal of Logic and Computation following peer review. The version of record, Pym, D; Collinson, M; McDonald, K; (2015) Layered graph logic as an assertion language for access control policy models. Journal of Logic and Computation, is available online at: http://dx.doi.org/10.1093/logcom/exv020. |
Keywords: | substructural logic, layered graphs, access control, modelling |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/1464201 |



1. | ![]() | 19 |
2. | ![]() | 5 |
3. | ![]() | 2 |
4. | ![]() | 1 |
5. | ![]() | 1 |
6. | ![]() | 1 |
7. | ![]() | 1 |
8. | ![]() | 1 |
Archive Staff Only
![]() |
View Item |