Reasoning for incomplete authorizations

Yun Bai, Robert J. Howlett, Ignac Lovrek, Lakhmi C. Jain

Research output: Chapter in Book / Conference PaperConference Paper

Abstract

Authorization plays an important role to control access to the system resources. It enforces security mechanism in compliance with the policies and rules specified by the security strategies. However, the security rules may not be always complete. In certain situations, we need to evaluate and reason about an incomplete security domain. In this paper, we propose an approach to reason under incomplete security domain by extended logic programs, discuss properties of unknown and conflict queries, and solve these problems by defining a procedure of evaluating the logic programs.
Original languageEnglish
Title of host publicationProceedings of the 12th International Conference on Knowledge-Based Intelligent Information & Engineering Systems: KES 2008, held in Zagreb, Croatia, 3-5 September, 2008
PublisherSpringer
Number of pages8
ISBN (Print)9783540855620
Publication statusPublished - 2008
EventInternational Conference on Knowledge-Based and Intelligent Information and Engineering Systems -
Duration: 1 Jan 2008 → …

Conference

ConferenceInternational Conference on Knowledge-Based and Intelligent Information and Engineering Systems
Period1/01/08 → …

Keywords

  • computer security
  • authorization
  • access control
  • logic programming
  • database security

Fingerprint

Dive into the research topics of 'Reasoning for incomplete authorizations'. Together they form a unique fingerprint.

Cite this