Abstract
Consider interaction of principals where each principal has its own policy and different principals may not trust each other. In one scenario the principals could be pharmaceutical companies, hospitals, biomedical labs and health related government institutions. In another scenario principals could be navy fleets of different and not necessarily friendly nations. In spite of the complexity of interaction, one may want to ensure that certain properties remain invariant. For example, in the navy scenario, each fleet should have enough information from other fleets to avoid unfortunate incidents. Furthermore, one wants to use automated provers to prove invariance. A natural approach to this and many other important problems is to provide a high-level logic-based language for the principals to communicate. We do just that. Three years ago two of us presented the first incarnation of Distributed Knowledge Authorization Language (DKAL). Here we present a new and much different incarnation of DKAL that we call Evidential DKAL. Statements communicated in Evidential DKAL are supposed to be accompanied with sufficient justifications. In general, we construe the term “authorization” in the acronym “DKAL” rather liberally; DKAL is essentially a general policy language. There is a wide spectrum of potential applications of KAL. One ambitious goal is to provide a framework for establishing and maintaining invariants.
Most fascinating is a feature that would make any journalist tremble. Tuyuca requires verb-endings on statements to show how the speaker knows something. Diga ape-wi means that the boy played soccer (I know because I saw him), while diga ape-hiyi means the boy played soccer (I assume). English can provide such information, but for Tuyuca that is an obligatory ending on the verb. Evidential languages force speakers to think hard about how they learned what they say they know.
—The Economist, January 1, 2010
To Bertrand Meyer, the Eiffel tower of program correctness.
* Blass was partially supported by NSF grant DMS-0653696. Part of the work reported here was performed during visits of Blass and Neeman to Microsoft.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems. ACM Trans. on Programming Languages and Systems, 15:4, 706–734 (1993)
Aikhenvald, A.Y.: Evidentiality. Oxford University Press (2004)
Appel, A.W., Felten, E.W.: Proof-Carrying Authentication. In: 6th ACM Conference on Computer and Communications Security, 52–62 (1999)
Becker, M.Y.: Specification and Analysis of Dynamic Authorisation Policies. In: 22nd IEEE Computer Security Foundations Symposium, 203–217 (2009)
Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and Semantics of a Decentralized Authorization Language. Journal of Computer Security 18:4, 597– 643 (2010)
Beklemishev, L., Gurevich, Y.: Infon Logic (tentative title). In preparation
Blass, A., Gurevich, Y.: Hilbertian Deductive Systems and Horn Formulas (tentative title). In preparation
DeTreville, J.: Binder, a Logic-Based Security Language. In: IEEE Symposium on Security and Privacy, 105–113, (2002)
DKAL at CodePlex. http://dkal.codeplex.com/, viewed July 6, 2010.
Shayne Cox Gad (ed.): Clinical Trials Handbook. Wiley (2009)
Gurevich, Y.: Evolving Algebra 1993: Lipari Guide. In: Specification and Validation Methods, Oxford University Press, 9–36 (1995)
Gurevich, Y., Neeman, I.: DKAL: Distributed-Knowledge Authorization Language. In: 21st IEEE Computer Security Foundations Symposium, 149–162 (2008)
Gurevich, Y., Neeman, I.: Logic of Infons: The Propositional Case. ACM Trans. on Computational Logic, to appear. See http://tocl.acm.org/accepted.html.
Gurevich, Y., Neeman, I.: DKAL 2 — A Simplified and Improved Authorization Language. Microsoft Research Technical Report MSR-TR-2009-11 (2009)
Gurevich, Y., Roy, A.: Operational Semantics for DKAL: Application and Analysis. In: 6th International Conference on Trust, Privacy and Security in Digital Business, Springer LNCS 5695, 149–158 (2009)
Gurevich, Y., Rossman, B., Schulte, W.: Semantic Essence of AsmL. Theoretical Computer Science 343:3, 370–412 (2005)
Lampson, B., Abadi, M., Burrows, M.,Wobber, E.P.: Authentication in Distributed Systems: Theory and Practice. ACM Trans. on Computer Systems 10:4, 265–310 (1992)
Spec Explorer: Development http://msdn.microsoft.com/en-us/devlabs/ee692301.aspx and research http://research.microsoft.com/en-us/projects/specexplorer/, viewed July 6, 2010
TSCP: Transglobal Secure Collaboration Program, http://tscp.org/, viewed July 6, 2010
XACML: Extensible Access Control Markup Language, http://xml.coverpages.org/xacml.html, viewed July 6, 2010
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Blass, A., Gurevich, Y., Moskal, M., Neeman, I. (2011). Evidential Authorization*. In: Nanz, S. (eds) The Future of Software Engineering. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15187-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-15187-3_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15186-6
Online ISBN: 978-3-642-15187-3
eBook Packages: Computer ScienceComputer Science (R0)