Back to Explorer
Research PaperResearchia:202603.16011[Computer Science > Cybersecurity]

Verification of Robust Properties for Access Control Policies

Alexander V. Gheorghiu

Abstract

Existing methods for verifying access control policies require the policy to be complete and fully determined before verification can proceed, but in practice policies are developed iteratively, composed from independently maintained components, and extended as organisational structures evolve. We introduce robust property verification: the problem of determining what a policy's structure commits it to regardless of how pending decisions are resolved and regardless of subsequent extension. We define a support judgment ⊩PΟ†\Vdash_{P}Ο† stating that policy PP has robust property φφ, with connectives for implication, conjunction, disjunction, and negation, prove that it is compositional (verified properties persist under policy extension by a monotonicity theorem), and show that despite quantifying universally over all possible policy extensions the judgment reduces to proof search in a second-order logic programming language. Soundness and completeness of this reduction are established, yielding a finitary and executable verification procedure for robust security properties.


Source: arXiv:2603.13181v1 - http://arxiv.org/abs/2603.13181v1 PDF: https://arxiv.org/pdf/2603.13181v1 Original Link: http://arxiv.org/abs/2603.13181v1

Submission:3/16/2026
Comments:0 comments
Subjects:Cybersecurity; Computer Science
Original Source:
View Original PDF
arXiv: This paper is hosted on arXiv, an open-access repository
Was this helpful?

Discussion (0)

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Verification of Robust Properties for Access Control Policies | Researchia