Abstract
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements.
Original language | English |
---|---|
Pages (from-to) | 669-678 |
Number of pages | 10 |
Journal | Lecture Notes in Computer Science |
Volume | 7345 |
DOIs | |
Publication status | Published - 2012 |
Keywords
- security requirements
- industrial engineering
- intelligent systems
- authorization provenance