Paradigm Regained: Abstraction Mechanisms for Access Control

Mark Samuel Miller, Jonathan S. Shapiro. Paradigm Regained: Abstraction Mechanisms for Access Control. In Vijay A. Saraswat, editor, Advances in Computing Science - ASIAN 2003 Programming Languages and Distributed Computation, 8th Asian Computing Science Conference, Mumbai, India, December 10-14, 2003, Proceedings. Volume 2896 of Lecture Notes in Computer Science, pages 224-242, Springer, 2003. [doi]

Abstract

Access control systems must be evaluated in part on how well they enable one to distribute the access rights needed for cooperation, while simultaneously limiting the propagation of rights which would create vulnerabilities. Analysis to date implicitly assumes access is controlled only by manipulating a system’s protection state—the arrangement of the access graph. Because of the limitations of this analysis, capability systems have been ``proven'' unable to enforce some basic policies: revocation, confinement, and the *-properties (explained in the text).

In actual practice, programmers build access abstractions—programs that help control access, extending the kinds of access control that can be expressed. Working in Dennis and van Horn’s original capability model, we show how abstractions were used in actual capability systems to enforce the above policies. These simple, often tractable programs limited the rights of arbitrarily complex, untrusted programs. When analysis includes the possibility of access abstractions, as it must, the original capability model is shown to be stronger than is commonly supposed.