We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote resource sharing, pri-vacy protection, and many other applications. We adopt the trust-management approach, in which “authorization ” is viewed as a “proof-of-compliance ” problem: Does a set of credentials prove that a request complies with a policy? We develop a logic-based language, called Delegation Logic (DL), to represent policies, creden-tials, and requests in distributed authorization. In this paper, we describe D1LP, the monotonic version of DL. D1LP extends the logic-programming (LP) language Datalog with expressive delega-tion constructs that feature delegation...
Distributed systems and applications are often expected to enforce high-level authorization policie...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
Trust management is a promising approach for the authorization in distributed environment. There are...
Logic programming with answer set semantics has been considered appealing rule-based formalism langu...
This paper studies logic-based methods for representing and evaluating complex access control polici...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Distributed systems and applications are often expected to enforce high-level authorization policie...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
Trust management is a promising approach for the authorization in distributed environment. There are...
Logic programming with answer set semantics has been considered appealing rule-based formalism langu...
This paper studies logic-based methods for representing and evaluating complex access control polici...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Distributed systems and applications are often expected to enforce high-level authorization policie...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...