Cornell University
Library
Cornell UniversityLibrary

eCommons

Help
Log In(current)
  1. Home
  2. Cornell Computing and Information Science
  3. Computing and Information Science
  4. Computing and Information Science Technical Reports
  5. Nexus Authorization Logic (NAL): Design Rationale and Applications

Nexus Authorization Logic (NAL): Design Rationale and Applications

File(s)
TechReportVers.trudocs.pdf (218.71 KB)
Permanent Link(s)
https://hdl.handle.net/1813/13679
Collections
Computing and Information Science Technical Reports
Author
Schneider, Fred B.
Walsh, Kevin
Sirer, Emin Gun
Abstract

Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics based on "says" and "speaksfor" operators, enabling within a single framework request authorization to depend on (i) the source or pedigree of the requester, (ii) the outcome of performing an analysis on the requester, or (iii) the use of trusted software to encapsulate or modify the requester. Prototype document-viewer applications that enforce integrity and confidentiality of document contents - all implemented on the Nexus operating system - illustrate the convenience and expressive power of this approach to authorization.

Description
Categories and Subject Descriptors: D.2.0 [General]: Protection mechanisms; D.4.6 [Security and Protection]: Access controls
Sponsorship
Supported in part by NICECAP cooperative agreement FA8750-07-2-0037 administered by AFRL, AFOSR grant F9550-06-0019, National Science Foundation grants 0430161 and CCF-04424422(TRUST), ONR grant N00014-01-1-0968, and grants from Microsoft and Intel.
Date Issued
2009-09-14T19:12:05Z
Keywords
Authorization Logic
•
Credentials-based Authorizations
•
CDD
•
Security

Site Statistics | Help

About eCommons | Policies | Terms of use | Contact Us

copyright © 2002-2026 Cornell University Library | Privacy | Web Accessibility Assistance