Specifying distributed authorization with delegation using logic programming

被引:0
|
作者
Wang, S [1 ]
Zhang, Y [1 ]
机构
[1] Univ Western Sydney, Sydney, NSW, Australia
来源
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS | 2005年 / 3682卷
关键词
ACCESS-CONTROL POLICIES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trust management is a promising approach for the authorization in distributed environment. There are two key issues for a trust management system: how to design high-level policy language and how to solve the compliance-checking problem [3, 4]. We adopt this approach to deal with distributed authorization with delegation. In this paper, we propose an authorization language AL, a human-understandable high level language to specify various authorization policies. Language AL has rich expressive power which can not only specify delegation, and threshold structures addressed in previous approaches, but also represent structured resources and privileges, positive and negative authorizations, separation of duty, incomplete information reasoning and partial authorization and delegation. We define the semantics of AL through logic programming with answer set semantics and through an authorization scenario we demonstrate the application of language AL.
引用
收藏
页码:761 / 767
页数:7
相关论文
共 50 条
  • [21] A Model for Delegation Based on Authentication and Authorization
    Chandersekaran, Coimbatore
    Simpson, William R.
    ADVANCED COMPUTING, PT III, 2011, 133 : 217 - +
  • [22] SPECIFYING THEOREM PROVERS IN A HIGHER-ORDER LOGIC PROGRAMMING LANGUAGE
    FELTY, A
    MILLER, D
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 310 : 61 - 80
  • [23] Fault Diagnosis for Distributed Cooperative System Using Inductive Logic Programming
    Sato, Shuichi
    Watanabe, Yosuke
    Seki, Hiroyuki
    Ishii, Yoshinao
    Yuen, Shoji
    2020 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT (ICPHM), 2020,
  • [24] Verification of authorization policies modified by delegation
    Egea, Marina
    Büttner, Fabian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 287 - 314
  • [25] Supporting efficient authorization in delegation with supervision
    Lui, RWC
    Chow, SSM
    Hui, LCK
    Yiu, SM
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 240 - 244
  • [26] An authorization framework based on constrained delegation
    Yin, G
    Teng, M
    Wang, H
    Jia, Y
    Shi, D
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 845 - 857
  • [27] Verification of authorization policies modified by delegation
    Egea, Marina
    Büttner, Fabian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 287 - 314
  • [28] A logic of delegation
    Norman, Timothy J.
    Reed, Chris
    ARTIFICIAL INTELLIGENCE, 2010, 174 (01) : 51 - 71
  • [29] Specifying Timed Patterns using Temporal Logic
    Ulus, Dogan
    Maler, Oded
    HSCC 2018: PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL (PART OF CPS WEEK), 2018, : 167 - 176
  • [30] DISTRIBUTED-PROGRAMMING WITH LOGIC TUPLE SPACES
    CIANCARINI, P
    NEW GENERATION COMPUTING, 1994, 12 (03) : 251 - 284