Reasoning for incomplete authorizations

Yun Bai, Robert J. Howlett, Ignac Lovrek, Lakhmi C. Jain

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[Authorization plays an important role to control access to the system resources. It enforces security mechanism in compliance with the policies and rules specified by the security strategies. However, the security rules may not be always complete. In certain situations, we need to evaluate and reason about an incomplete security domain. In this paper, we propose an approach to reason under incomplete security domain by extended logic programs, discuss properties of unknown and conflict queries, and solve these problems by defining a procedure of evaluating the logic programs.]]
    Original languageEnglish
    Title of host publicationProceedings of the 12th International Conference on Knowledge-Based Intelligent Information & Engineering Systems: KES 2008, held in Zagreb, Croatia, 3-5 September, 2008
    PublisherSpringer
    Number of pages8
    ISBN (Print)9783540855620
    Publication statusPublished - 2008
    EventInternational Conference on Knowledge-Based and Intelligent Information and Engineering Systems -
    Duration: 1 Jan 2008 → …

    Conference

    ConferenceInternational Conference on Knowledge-Based and Intelligent Information and Engineering Systems
    Period1/01/08 → …

    Keywords

    • computer security
    • authorization
    • access control
    • logic programming
    • database security

    Fingerprint

    Dive into the research topics of 'Reasoning for incomplete authorizations'. Together they form a unique fingerprint.

    Cite this