Chapter

Computer Security – ESORICS 2006

Volume 4189 of the series Lecture Notes in Computer Science pp 297-312

A Linear Logic of Authorization and Knowledge

  • Deepak GargAffiliated withCarnegie Mellon University
  • , Lujo BauerAffiliated withCarnegie Mellon University
  • , Kevin D. BowersAffiliated withCarnegie Mellon University
  • , Frank PfenningAffiliated withCarnegie Mellon University
  • , Michael K. ReiterAffiliated withCarnegie Mellon University

* Final gross prices may vary according to local VAT.

Get Access

Abstract

We propose a logic for specifying security policies at a very high level of abstraction. The logic accommodates the subjective nature of affirmations for authorization and knowledge without compromising the objective nature of logical inference. In order to accurately model consumable authorizations and resources, we construct our logic as a modal enrichment of linear logic. We show that the logic satisfies cut elimination, which is a proof-theoretic expression of its soundness. We also demonstrate that the logic is amenable to meta-reasoning about specifications expressed in it through several examples.