TY - GEN
T1 - Managing authorization provenance : a modal logic based approach
AU - Hu, Jinwei
AU - Zhang, Yan
AU - Li, Ruixuan
AU - Lu, Zhengding
PY - 2009
Y1 - 2009
N2 - ![CDATA[In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.]]
AB - ![CDATA[In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.]]
UR - http://handle.uws.edu.au:8081/1959.7/562564
UR - http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5362557
U2 - 10.1109/ICTAI.2009.49
DO - 10.1109/ICTAI.2009.49
M3 - Conference Paper
SN - 9781424456192
SP - 621
EP - 624
BT - Proceedings of the 21st IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2009): Newark, New Jersey, 2-5 November 2009
PB - IEEE
T2 - International Conference on Tools for Artificial Intelligence
Y2 - 2 November 2009
ER -