ExplorerComputer ScienceCybersecurity
Research PaperResearchia:202603.16011

Verification of Robust Properties for Access Control Policies

Alexander V. Gheorghiu

Abstract

Existing methods for verifying access control policies require the policy to be complete and fully determined before verification can proceed, but in practice policies are developed iteratively, composed from independently maintained components, and extended as organisational structures evolve. We introduce robust property verification: the problem of determining what a policy's structure commits it to regardless of how pending decisions are resolved and regardless of subsequent extension. We de...

Submitted: March 16, 2026Subjects: Cybersecurity; Computer Science

Description / Details

Existing methods for verifying access control policies require the policy to be complete and fully determined before verification can proceed, but in practice policies are developed iteratively, composed from independently maintained components, and extended as organisational structures evolve. We introduce robust property verification: the problem of determining what a policy's structure commits it to regardless of how pending decisions are resolved and regardless of subsequent extension. We define a support judgment Pφ\Vdash_{P}φ stating that policy PP has robust property φφ, with connectives for implication, conjunction, disjunction, and negation, prove that it is compositional (verified properties persist under policy extension by a monotonicity theorem), and show that despite quantifying universally over all possible policy extensions the judgment reduces to proof search in a second-order logic programming language. Soundness and completeness of this reduction are established, yielding a finitary and executable verification procedure for robust security properties.


Source: arXiv:2603.13181v1 - http://arxiv.org/abs/2603.13181v1 PDF: https://arxiv.org/pdf/2603.13181v1 Original Link: http://arxiv.org/abs/2603.13181v1

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Access Paper
View Source PDF
Submission Info
Date:
Mar 16, 2026
Topic:
Computer Science
Area:
Cybersecurity
Comments:
0
Bookmark
Verification of Robust Properties for Access Control Policies | Researchia