Abstract
![CDATA[Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains. Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains.]]
Original language | English |
---|---|
Title of host publication | SecTech 2008: Proceedings 2008 International Conference on Security Technology, held 13-15 December 2008, in Hainan Island, China |
Publisher | IEEE Computer Society |
Number of pages | 4 |
ISBN (Print) | 9780769534862 |
Publication status | Published - 2008 |
Event | International Conference on Security Technology - Duration: 1 Jan 2008 → … |
Conference
Conference | International Conference on Security Technology |
---|---|
Period | 1/01/08 → … |
Keywords
- distributed systems
- logic programming
- electronic data processing
- access control
- computer security
- authorization