Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed for each application. From access control, we adopt the use of a saying operator. From conformance checking, we adopt the use of operators for obligation and permission. The operators are combined using an axiom that permits a principal to speak on behalf of another. The combination yields benefits to both applications. For access control, we overcome the problematic interaction between hand-off and classical reasoning. For conformance, we obtain a characterization of legal power by nesting saying wit...
We present a declarative authorization language. Policies and credentials are ex-pressed using predi...
International audienceConstraints in access control models are used to organize access privileges in...
Although several access control policies have been proposed for securing access to resources, they f...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
AbstractFormal languages for policy have been developed for access control and conformance checking....
A major drawback of existing access control systems is that they have all been developed with a spec...
We consider the problem of checking whether an organization conforms to a body of regulation. Confor...
We present a new modal access control logic, ACL + , to specify, reason about and enforce access con...
Despite considerable advancements in the area of access control and authorization languages, current...
Despite considerable advancements in the area of access control and authorization languages, current...
We consider the problem of checking whether an organization conforms to a body of regulation. Confor...
We present a constructive authorization logic where the meanings of connectives are defined by their...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
An authorization policy states the conditions under which an action is permitted or forbidden. In th...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
We present a declarative authorization language. Policies and credentials are ex-pressed using predi...
International audienceConstraints in access control models are used to organize access privileges in...
Although several access control policies have been proposed for securing access to resources, they f...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
AbstractFormal languages for policy have been developed for access control and conformance checking....
A major drawback of existing access control systems is that they have all been developed with a spec...
We consider the problem of checking whether an organization conforms to a body of regulation. Confor...
We present a new modal access control logic, ACL + , to specify, reason about and enforce access con...
Despite considerable advancements in the area of access control and authorization languages, current...
Despite considerable advancements in the area of access control and authorization languages, current...
We consider the problem of checking whether an organization conforms to a body of regulation. Confor...
We present a constructive authorization logic where the meanings of connectives are defined by their...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
An authorization policy states the conditions under which an action is permitted or forbidden. In th...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
We present a declarative authorization language. Policies and credentials are ex-pressed using predi...
International audienceConstraints in access control models are used to organize access privileges in...
Although several access control policies have been proposed for securing access to resources, they f...