International audienceConstraints in access control models are used to organize access privileges in order to avoid fraudulent situations. Ensuring that the constraints are satisfied during the evolution of the system is an important issue. Thus, there is a need to have a formal reasoning language in order to express the constraints policy and to prove that the constraints are always satisfied. In this work, we propose a formal language based on the deontic logic of actions and situation calculus. The proposed language is easy to use to specify various constraints mentioned in the literature. In addition, we formally specify the condition to prove that the system specification is secure with respect to the access control requirements
Abstract. We show that soft constraints can be used to model logical reasoning, that is deduction an...
As a security mechanism, authorization or access control ensures that all accesses to the system res...
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model ...
International audienceConstraints in access control models are used to organize access privileges in...
A major drawback of existing access control systems is that they have all been developed with a spec...
International audienceAccess control policies are set of facts and rules that determine whether an a...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
Despite considerable advancements in the area of access control and authorization languages, current...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Access control systems are widely used means for the protection of computing systems. They are defin...
Although several access control policies have been proposed for securing access to resources, they f...
Despite considerable advancements in the area of access control and authorization languages, current...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
Access control is the process of mediating every request to data and services maintained by a system...
Abstract. We show that soft constraints can be used to model logical reasoning, that is deduction an...
As a security mechanism, authorization or access control ensures that all accesses to the system res...
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model ...
International audienceConstraints in access control models are used to organize access privileges in...
A major drawback of existing access control systems is that they have all been developed with a spec...
International audienceAccess control policies are set of facts and rules that determine whether an a...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
Despite considerable advancements in the area of access control and authorization languages, current...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Access control systems are widely used means for the protection of computing systems. They are defin...
Although several access control policies have been proposed for securing access to resources, they f...
Despite considerable advancements in the area of access control and authorization languages, current...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
Access control is the process of mediating every request to data and services maintained by a system...
Abstract. We show that soft constraints can be used to model logical reasoning, that is deduction an...
As a security mechanism, authorization or access control ensures that all accesses to the system res...
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model ...