Analysis and implementation of a formal authorization policy design approach

Yun Bai, Vijay Varadharajan

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

In [1], we proposed a formal approach to specify authorization policies and their transformations. In this paper, we discuss the implementation issues of this approach and analyse the complexities of the algorithms introduced.

Original languageEnglish
Title of host publicationInformation Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings
EditorsJosef Pieprzyk, Vijay Varadharajan, Yi Mu
PublisherSpringer Verlag
Pages14-25
Number of pages12
ISBN (Print)3540632328, 9783540632320
DOIs
Publication statusPublished - 1997
Event2nd Australasian Conference on Information Security and Privacy, ACISP 1997 - Sydney, Australia
Duration: 7 Jul 19979 Jul 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1270
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd Australasian Conference on Information Security and Privacy, ACISP 1997
Country/TerritoryAustralia
CitySydney
Period7/07/979/07/97

Bibliographical note

Publisher Copyright:
© 1997, Springer-Verlag. All rights reserved.

Keywords

  • Authorization policy
  • Logic based specification
  • Security
  • Transformations

Fingerprint

Dive into the research topics of 'Analysis and implementation of a formal authorization policy design approach'. Together they form a unique fingerprint.

Cite this