This paper studies logic-based methods for representing and evaluating complex access control policies needed by modern applications. In our framework, authorization and delegation rules are specified in a weighted delegatable authorization program, which is an extended logic program. We show how extended logic programs can be used to specify complex security policies, which support weighted administrative privilege delegation, weighted positive and negative authorizations, and weighted authorization propagations. We also present a conflict resolution method that enables flexible delegation control by considering priorities of authorization grantors and weights of authorizations. We show how this method can be specialized to achieve many of...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic based methods for representing and evaluating complex access control polici...
In this paper, we describe a logic based authorization program and its implementation. Weighted Dele...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
Authorization delegations and negations are two important features of a flexible access control mode...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Authorizations or access control is an essential security mechanism to protect computer systems from...
As a security mechanism, authorization is to provide access control to the system resources accordin...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
A major drawback of existing access control systems is that they have all been developed with a spec...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
This paper studies logic based methods for representing and evaluating complex access control polici...
This paper studies logic based methods for representing and evaluating complex access control polici...
In this paper, we describe a logic based authorization program and its implementation. Weighted Dele...
In this paper, we propose a logic program based formulation that supports delegatable authorizations...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
Authorization delegations and negations are two important features of a flexible access control mode...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Authorizations or access control is an essential security mechanism to protect computer systems from...
As a security mechanism, authorization is to provide access control to the system resources accordin...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
A major drawback of existing access control systems is that they have all been developed with a spec...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Graph-based approach to access control models have been studied by researchers due to its visualizat...