Abstract
In [1], we proposed a formal approach to specify authorization policies and their transformations. In this paper, we discuss the implementation issues of this approach and analyse the complexities of the algorithms introduced.
| Original language | English |
|---|---|
| Title of host publication | Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings |
| Editors | Josef Pieprzyk, Vijay Varadharajan, Yi Mu |
| Publisher | Springer Verlag |
| Pages | 14-25 |
| Number of pages | 12 |
| ISBN (Print) | 3540632328, 9783540632320 |
| DOIs | |
| Publication status | Published - 1997 |
| Event | 2nd Australasian Conference on Information Security and Privacy, ACISP 1997 - Sydney, Australia Duration: 7 Jul 1997 → 9 Jul 1997 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 1270 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 2nd Australasian Conference on Information Security and Privacy, ACISP 1997 |
|---|---|
| Country/Territory | Australia |
| City | Sydney |
| Period | 7/07/97 → 9/07/97 |
Bibliographical note
Publisher Copyright:© 1997, Springer-Verlag. All rights reserved.
Keywords
- Authorization policy
- Logic based specification
- Security
- Transformations