Abstract
![CDATA[Authorization plays an important role to control access to the system resources. It enforces security mechanism in compliance with the policies and rules specified by the security strategies. However, the security rules may not be always complete. In certain situations, we need to evaluate and reason about an incomplete security domain. In this paper, we propose an approach to reason under incomplete security domain by extended logic programs, discuss properties of unknown and conflict queries, and solve these problems by defining a procedure of evaluating the logic programs.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the 12th International Conference on Knowledge-Based Intelligent Information & Engineering Systems: KES 2008, held in Zagreb, Croatia, 3-5 September, 2008 |
Publisher | Springer |
Number of pages | 8 |
ISBN (Print) | 9783540855620 |
Publication status | Published - 2008 |
Event | International Conference on Knowledge-Based and Intelligent Information and Engineering Systems - Duration: 1 Jan 2008 → … |
Conference
Conference | International Conference on Knowledge-Based and Intelligent Information and Engineering Systems |
---|---|
Period | 1/01/08 → … |
Keywords
- computer security
- authorization
- access control
- logic programming
- database security