Loading…
A nonmonotonic modal authorization logic for pervasive computing
Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are pr...
Saved in:
Published in: | Security and communication networks 2015-04, Vol.8 (6), p.1077-1091 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23 |
---|---|
cites | cdi_FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23 |
container_end_page | 1091 |
container_issue | 6 |
container_start_page | 1077 |
container_title | Security and communication networks |
container_volume | 8 |
creator | Noorollahi, Ali Fallah, Mehran S. |
description | Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are provided to human users in a dynamic manner. These features suggest the need for the modification of existing logics in two directions. First, users’ capabilities being intrinsic to pervasive computing should be incorporated into the underlying modal logic. Second, the logic should be equipped with appropriate machinery so that it can deal with the imperfection in the information required for authorization. This paper has contributions in both directions. We present a logic that reflects how the capabilities of users change in different contexts. Nonmonotonicity is then added to the logic so that earlier decisions based on imperfect information can be retracted. The usefulness of our formulation is demonstrated through the added capacity it provides for specifying and enforcing access control policies in real‐life environments. We also present a minimal model semantics that reflects nonmonotonicity through the way it gives meaning to the formulas of the logic. Finally, we propose a sound and complete decision procedure based on semantic tableaux. Copyright © 2014 John Wiley & Sons, Ltd.
Modal logics have been employed for authorization in distributed systems. New computing environments, however, pose new challenges in devising appropriate logics. This paper concentrates on the aspects of an effective authorization logic for pervasive computing and develops a nonmonotonic modal logic to this end. In particular, the logic proposed can handle uncertain and imperfect information about the principals and the contexts in which they make their requests. |
doi_str_mv | 10.1002/sec.1063 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1677947920</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3621186921</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23</originalsourceid><addsrcrecordid>eNp10F1LwzAUBuAiCs4p-BMK3nhTzUebNHeOOacw9GITvQtZmszMNqlJO52_3o7JRMGrc-A8vBzeKDqF4AICgC6Dkt1C8F7UgwyzBECE9nc7TA-joxCWABCY0rQXXQ1i62zlrGucNTKuXCHKWLTNi_PmUzTG2bh0i-6inY9r5VcimJWKpavqtjF2cRwdaFEGdfI9-9HjzWg2vE0mD-O74WCSSMxynGCkUUrhXORIp7rIkKBEKwYZUXNSEE1ziDDGSkolmCYAFiqFgmI2FxJlGuF-dL7Nrb17a1VoeGWCVGUprHJt4JBQylLKEOjo2R-6dK233XedIghnhDLyEyi9C8ErzWtvKuHXHAK-qZJ3VfJNlR1NtvTdlGr9r-PT0fC3N6FRHzsv_CsnFNOMP92P-TTHDM6uKX_GX-TAg1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1662356796</pqid></control><display><type>article</type><title>A nonmonotonic modal authorization logic for pervasive computing</title><source>Publicly Available Content Database</source><creator>Noorollahi, Ali ; Fallah, Mehran S.</creator><creatorcontrib>Noorollahi, Ali ; Fallah, Mehran S.</creatorcontrib><description>Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are provided to human users in a dynamic manner. These features suggest the need for the modification of existing logics in two directions. First, users’ capabilities being intrinsic to pervasive computing should be incorporated into the underlying modal logic. Second, the logic should be equipped with appropriate machinery so that it can deal with the imperfection in the information required for authorization. This paper has contributions in both directions. We present a logic that reflects how the capabilities of users change in different contexts. Nonmonotonicity is then added to the logic so that earlier decisions based on imperfect information can be retracted. The usefulness of our formulation is demonstrated through the added capacity it provides for specifying and enforcing access control policies in real‐life environments. We also present a minimal model semantics that reflects nonmonotonicity through the way it gives meaning to the formulas of the logic. Finally, we propose a sound and complete decision procedure based on semantic tableaux. Copyright © 2014 John Wiley & Sons, Ltd.
Modal logics have been employed for authorization in distributed systems. New computing environments, however, pose new challenges in devising appropriate logics. This paper concentrates on the aspects of an effective authorization logic for pervasive computing and develops a nonmonotonic modal logic to this end. In particular, the logic proposed can handle uncertain and imperfect information about the principals and the contexts in which they make their requests.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1063</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>Communication networks ; Computer networks ; Decisions ; Dynamical systems ; Logic ; Mathematical models ; modal authorization logic ; nonmonotonicity ; pervasive computing ; Policies ; Semantics ; Ubiquitous computing</subject><ispartof>Security and communication networks, 2015-04, Vol.8 (6), p.1077-1091</ispartof><rights>Copyright © 2014 John Wiley & Sons, Ltd.</rights><rights>Copyright © 2015 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23</citedby><cites>FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1662356796?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25752,27923,27924,37011,37012,44589</link.rule.ids></links><search><creatorcontrib>Noorollahi, Ali</creatorcontrib><creatorcontrib>Fallah, Mehran S.</creatorcontrib><title>A nonmonotonic modal authorization logic for pervasive computing</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are provided to human users in a dynamic manner. These features suggest the need for the modification of existing logics in two directions. First, users’ capabilities being intrinsic to pervasive computing should be incorporated into the underlying modal logic. Second, the logic should be equipped with appropriate machinery so that it can deal with the imperfection in the information required for authorization. This paper has contributions in both directions. We present a logic that reflects how the capabilities of users change in different contexts. Nonmonotonicity is then added to the logic so that earlier decisions based on imperfect information can be retracted. The usefulness of our formulation is demonstrated through the added capacity it provides for specifying and enforcing access control policies in real‐life environments. We also present a minimal model semantics that reflects nonmonotonicity through the way it gives meaning to the formulas of the logic. Finally, we propose a sound and complete decision procedure based on semantic tableaux. Copyright © 2014 John Wiley & Sons, Ltd.
Modal logics have been employed for authorization in distributed systems. New computing environments, however, pose new challenges in devising appropriate logics. This paper concentrates on the aspects of an effective authorization logic for pervasive computing and develops a nonmonotonic modal logic to this end. In particular, the logic proposed can handle uncertain and imperfect information about the principals and the contexts in which they make their requests.</description><subject>Communication networks</subject><subject>Computer networks</subject><subject>Decisions</subject><subject>Dynamical systems</subject><subject>Logic</subject><subject>Mathematical models</subject><subject>modal authorization logic</subject><subject>nonmonotonicity</subject><subject>pervasive computing</subject><subject>Policies</subject><subject>Semantics</subject><subject>Ubiquitous computing</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp10F1LwzAUBuAiCs4p-BMK3nhTzUebNHeOOacw9GITvQtZmszMNqlJO52_3o7JRMGrc-A8vBzeKDqF4AICgC6Dkt1C8F7UgwyzBECE9nc7TA-joxCWABCY0rQXXQ1i62zlrGucNTKuXCHKWLTNi_PmUzTG2bh0i-6inY9r5VcimJWKpavqtjF2cRwdaFEGdfI9-9HjzWg2vE0mD-O74WCSSMxynGCkUUrhXORIp7rIkKBEKwYZUXNSEE1ziDDGSkolmCYAFiqFgmI2FxJlGuF-dL7Nrb17a1VoeGWCVGUprHJt4JBQylLKEOjo2R-6dK233XedIghnhDLyEyi9C8ErzWtvKuHXHAK-qZJ3VfJNlR1NtvTdlGr9r-PT0fC3N6FRHzsv_CsnFNOMP92P-TTHDM6uKX_GX-TAg1A</recordid><startdate>201504</startdate><enddate>201504</enddate><creator>Noorollahi, Ali</creator><creator>Fallah, Mehran S.</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201504</creationdate><title>A nonmonotonic modal authorization logic for pervasive computing</title><author>Noorollahi, Ali ; Fallah, Mehran S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Communication networks</topic><topic>Computer networks</topic><topic>Decisions</topic><topic>Dynamical systems</topic><topic>Logic</topic><topic>Mathematical models</topic><topic>modal authorization logic</topic><topic>nonmonotonicity</topic><topic>pervasive computing</topic><topic>Policies</topic><topic>Semantics</topic><topic>Ubiquitous computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Noorollahi, Ali</creatorcontrib><creatorcontrib>Fallah, Mehran S.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Noorollahi, Ali</au><au>Fallah, Mehran S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A nonmonotonic modal authorization logic for pervasive computing</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2015-04</date><risdate>2015</risdate><volume>8</volume><issue>6</issue><spage>1077</spage><epage>1091</epage><pages>1077-1091</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Modal logics have proven invaluable for authorization in distributed systems. The logics devised so far, however, are inadequate to meet the requirements of pervasive environments. Such environments are, in general, characterized as open systems in which computing and communication facilities are provided to human users in a dynamic manner. These features suggest the need for the modification of existing logics in two directions. First, users’ capabilities being intrinsic to pervasive computing should be incorporated into the underlying modal logic. Second, the logic should be equipped with appropriate machinery so that it can deal with the imperfection in the information required for authorization. This paper has contributions in both directions. We present a logic that reflects how the capabilities of users change in different contexts. Nonmonotonicity is then added to the logic so that earlier decisions based on imperfect information can be retracted. The usefulness of our formulation is demonstrated through the added capacity it provides for specifying and enforcing access control policies in real‐life environments. We also present a minimal model semantics that reflects nonmonotonicity through the way it gives meaning to the formulas of the logic. Finally, we propose a sound and complete decision procedure based on semantic tableaux. Copyright © 2014 John Wiley & Sons, Ltd.
Modal logics have been employed for authorization in distributed systems. New computing environments, however, pose new challenges in devising appropriate logics. This paper concentrates on the aspects of an effective authorization logic for pervasive computing and develops a nonmonotonic modal logic to this end. In particular, the logic proposed can handle uncertain and imperfect information about the principals and the contexts in which they make their requests.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.1063</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2015-04, Vol.8 (6), p.1077-1091 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1677947920 |
source | Publicly Available Content Database |
subjects | Communication networks Computer networks Decisions Dynamical systems Logic Mathematical models modal authorization logic nonmonotonicity pervasive computing Policies Semantics Ubiquitous computing |
title | A nonmonotonic modal authorization logic for pervasive computing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T21%3A13%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20nonmonotonic%20modal%20authorization%20logic%20for%20pervasive%20computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=Noorollahi,%20Ali&rft.date=2015-04&rft.volume=8&rft.issue=6&rft.spage=1077&rft.epage=1091&rft.pages=1077-1091&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1063&rft_dat=%3Cproquest_cross%3E3621186921%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c3983-32f2471ba82f4fd52a76fe9196eb6d6f7812333eccea9f601de41a739bac25f23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1662356796&rft_id=info:pmid/&rfr_iscdi=true |