Managing authorization provenance : a modal logic based approach

Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    Abstract

    ![CDATA[In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.]]
    Original languageEnglish
    Title of host publicationProceedings of the 21st IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2009): Newark, New Jersey, 2-5 November 2009
    PublisherIEEE
    Pages621-624
    Number of pages4
    ISBN (Print)9781424456192
    DOIs
    Publication statusPublished - 2009
    EventInternational Conference on Tools for Artificial Intelligence -
    Duration: 2 Nov 2009 → …

    Publication series

    Name
    ISSN (Print)1082-3409

    Conference

    ConferenceInternational Conference on Tools for Artificial Intelligence
    Period2/11/09 → …

    Fingerprint

    Dive into the research topics of 'Managing authorization provenance : a modal logic based approach'. Together they form a unique fingerprint.

    Cite this