Managing authorization provenance : a modal logic based approach

Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.
Original languageEnglish
Title of host publicationProceedings of the 21st IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2009): Newark, New Jersey, 2-5 November 2009
PublisherIEEE
Pages621-624
Number of pages4
ISBN (Print)9781424456192
DOIs
Publication statusPublished - 2009
EventInternational Conference on Tools for Artificial Intelligence -
Duration: 2 Nov 2009 → …

Publication series

Name
ISSN (Print)1082-3409

Conference

ConferenceInternational Conference on Tools for Artificial Intelligence
Period2/11/09 → …

Fingerprint

Dive into the research topics of 'Managing authorization provenance : a modal logic based approach'. Together they form a unique fingerprint.

Cite this