This paper studies logic based methods for representing and evaluating complex access control policies needed by modern database applications. In our framework, authorization and delegation rules are specified in a Weighted Delegatable Authorization Program (WDAP) which is an extended logic program. We show how extended logic programs can be used to specify complex security policies which support weighted administrative privilege delegation, weighted positive and negative authorizations, and weighted authorization propagations. We also propose a conflict resolution method that enables flexible delegation control by considering priorities of authorization grantors and weights of authorizations. A number of rules are provided to achieve deleg...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
Authorizations or access control is an essential security mechanism to protect computer systems from...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic-based methods for representing and evaluating complex access control polici...
In this paper, we describe a logic based authorization program and its implementation. Weighted Dele...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Authorization delegations and negations are two important features of a flexible access control mode...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
Authorizations or access control is an essential security mechanism to protect computer systems from...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic-based methods for representing and evaluating complex access control polici...
In this paper, we describe a logic based authorization program and its implementation. Weighted Dele...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Authorization delegations and negations are two important features of a flexible access control mode...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
Authorizations or access control is an essential security mechanism to protect computer systems from...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...