Abstract
![CDATA[Authorization policies provide access control to the system resource. This paper proposes a formal modal logic approach for the specification and reasoning about authorizations. Especially we investigate and handle the situation where the security agent's knowledge is not specific and the decisions for accessing the system resource are to be made based on the agent's knowledge. We introduce modal logic to specify and reason about security policies, then translate the domain into an epistemic logic program. We also present a case study to demonstrate the proposed approach. This approach has an expressive power to describe a variety of complex security scenarios.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009): Shanghai, China, 20-22 November 2009 |
Publisher | IEEE |
Pages | 264-268 |
Number of pages | 5 |
ISBN (Print) | 9781424447541 |
DOIs | |
Publication status | Published - 2009 |
Event | IEEE International Conference on Intelligent Computing and Intelligent Systems - Duration: 20 Nov 2009 → … |
Conference
Conference | IEEE International Conference on Intelligent Computing and Intelligent Systems |
---|---|
Period | 20/11/09 → … |