Skip to main content

Evidential Authorization*

  • Chapter
  • First Online:
The Future of Software Engineering

Abstract

Consider interaction of principals where each principal has its own policy and different principals may not trust each other. In one scenario the principals could be pharmaceutical companies, hospitals, biomedical labs and health related government institutions. In another scenario principals could be navy fleets of different and not necessarily friendly nations. In spite of the complexity of interaction, one may want to ensure that certain properties remain invariant. For example, in the navy scenario, each fleet should have enough information from other fleets to avoid unfortunate incidents. Furthermore, one wants to use automated provers to prove invariance. A natural approach to this and many other important problems is to provide a high-level logic-based language for the principals to communicate. We do just that. Three years ago two of us presented the first incarnation of Distributed Knowledge Authorization Language (DKAL). Here we present a new and much different incarnation of DKAL that we call Evidential DKAL. Statements communicated in Evidential DKAL are supposed to be accompanied with sufficient justifications. In general, we construe the term “authorization” in the acronym “DKAL” rather liberally; DKAL is essentially a general policy language. There is a wide spectrum of potential applications of KAL. One ambitious goal is to provide a framework for establishing and maintaining invariants.

Most fascinating is a feature that would make any journalist tremble. Tuyuca requires verb-endings on statements to show how the speaker knows something. Diga ape-wi means that the boy played soccer (I know because I saw him), while diga ape-hiyi means the boy played soccer (I assume). English can provide such information, but for Tuyuca that is an obligatory ending on the verb. Evidential languages force speakers to think hard about how they learned what they say they know.

—The Economist, January 1, 2010

To Bertrand Meyer, the Eiffel tower of program correctness.

* Blass was partially supported by NSF grant DMS-0653696. Part of the work reported here was performed during visits of Blass and Neeman to Microsoft.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems. ACM Trans. on Programming Languages and Systems, 15:4, 706–734 (1993)

    Article  Google Scholar 

  2. Aikhenvald, A.Y.: Evidentiality. Oxford University Press (2004)

    Google Scholar 

  3. Appel, A.W., Felten, E.W.: Proof-Carrying Authentication. In: 6th ACM Conference on Computer and Communications Security, 52–62 (1999)

    Google Scholar 

  4. Becker, M.Y.: Specification and Analysis of Dynamic Authorisation Policies. In: 22nd IEEE Computer Security Foundations Symposium, 203–217 (2009)

    Google Scholar 

  5. Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and Semantics of a Decentralized Authorization Language. Journal of Computer Security 18:4, 597– 643 (2010)

    Google Scholar 

  6. Beklemishev, L., Gurevich, Y.: Infon Logic (tentative title). In preparation

    Google Scholar 

  7. Blass, A., Gurevich, Y.: Hilbertian Deductive Systems and Horn Formulas (tentative title). In preparation

    Google Scholar 

  8. DeTreville, J.: Binder, a Logic-Based Security Language. In: IEEE Symposium on Security and Privacy, 105–113, (2002)

    Google Scholar 

  9. DKAL at CodePlex. http://dkal.codeplex.com/, viewed July 6, 2010.

  10. Shayne Cox Gad (ed.): Clinical Trials Handbook. Wiley (2009)

    Google Scholar 

  11. Gurevich, Y.: Evolving Algebra 1993: Lipari Guide. In: Specification and Validation Methods, Oxford University Press, 9–36 (1995)

    Google Scholar 

  12. Gurevich, Y., Neeman, I.: DKAL: Distributed-Knowledge Authorization Language. In: 21st IEEE Computer Security Foundations Symposium, 149–162 (2008)

    Google Scholar 

  13. Gurevich, Y., Neeman, I.: Logic of Infons: The Propositional Case. ACM Trans. on Computational Logic, to appear. See http://tocl.acm.org/accepted.html.

  14. Gurevich, Y., Neeman, I.: DKAL 2 — A Simplified and Improved Authorization Language. Microsoft Research Technical Report MSR-TR-2009-11 (2009)

    Google Scholar 

  15. Gurevich, Y., Roy, A.: Operational Semantics for DKAL: Application and Analysis. In: 6th International Conference on Trust, Privacy and Security in Digital Business, Springer LNCS 5695, 149–158 (2009)

    Google Scholar 

  16. Gurevich, Y., Rossman, B., Schulte, W.: Semantic Essence of AsmL. Theoretical Computer Science 343:3, 370–412 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  17. Lampson, B., Abadi, M., Burrows, M.,Wobber, E.P.: Authentication in Distributed Systems: Theory and Practice. ACM Trans. on Computer Systems 10:4, 265–310 (1992)

    Article  Google Scholar 

  18. Spec Explorer: Development http://msdn.microsoft.com/en-us/devlabs/ee692301.aspx and research http://research.microsoft.com/en-us/projects/specexplorer/, viewed July 6, 2010

  19. TSCP: Transglobal Secure Collaboration Program, http://tscp.org/, viewed July 6, 2010

  20. XACML: Extensible Access Control Markup Language, http://xml.coverpages.org/xacml.html, viewed July 6, 2010

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Blass, A., Gurevich, Y., Moskal, M., Neeman, I. (2011). Evidential Authorization*. In: Nanz, S. (eds) The Future of Software Engineering. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15187-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15187-3_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15186-6

  • Online ISBN: 978-3-642-15187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics