Specifying distributed authorization with delegation using logic programming

被引:0
|
作者
Wang, S [1 ]
Zhang, Y [1 ]
机构
[1] Univ Western Sydney, Sydney, NSW, Australia
关键词
ACCESS-CONTROL POLICIES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trust management is a promising approach for the authorization in distributed environment. There are two key issues for a trust management system: how to design high-level policy language and how to solve the compliance-checking problem [3, 4]. We adopt this approach to deal with distributed authorization with delegation. In this paper, we propose an authorization language AL, a human-understandable high level language to specify various authorization policies. Language AL has rich expressive power which can not only specify delegation, and threshold structures addressed in previous approaches, but also represent structured resources and privileges, positive and negative authorizations, separation of duty, incomplete information reasoning and partial authorization and delegation. We define the semantics of AL through logic programming with answer set semantics and through an authorization scenario we demonstrate the application of language AL.
引用
收藏
页码:761 / 767
页数:7
相关论文
共 50 条
  • [31] Constraint satisfaction in distributed concurrent logic programming
    Leung, HF
    Clark, KL
    JOURNAL OF SYMBOLIC COMPUTATION, 1996, 21 (4-6) : 699 - 714
  • [32] Logic channels: A coordination approach to distributed programming
    Diaz, M
    Rubio, B
    Troya, JM
    11TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM, PROCEEDINGS, 1997, : 436 - 442
  • [33] An investigation of scheduling in distributed constraint logic programming
    Villaverde, K
    Pontelli, E
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 98 - 103
  • [34] Role delegation authorization model for CSCD system
    School of Mechanical Engineering and Automation, Northeastern University, Shenyang 110004, China
    不详
    Dongbei Daxue Xuebao, 2006, 5 (548-551):
  • [35] Enable delegation for RBAC with Secure Authorization Certificate
    Zhou, GuangXu
    Demirer, Murat
    Bayrak, Coskun
    Wang, Licheng
    COMPUTERS & SECURITY, 2011, 30 (08) : 780 - 790
  • [36] FlexAuth: A Decentralized Authorization System with Flexible Delegation
    Fei, Ziyu
    Li, Ying
    Wei, Jiuqi
    Fu, Yufan
    Peng, Botao
    Li, Xiaodong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1790 - 1797
  • [37] Role-based delegation with negative authorization
    Wang, H
    Cao, JL
    Ross, D
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 307 - 318
  • [38] SPECIFYING DISTRIBUTED SYSTEMS USING A DIAGRAMATIC NOTATION
    Bavan, A. S.
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 477 - 481
  • [39] WAVE: A Decentralized Authorization Framework with Transitive Delegation
    Andersen, Michael P.
    Kumar, Sam
    AbdelBaky, Moustafa
    Fierro, Gabe
    Kolb, John
    Kim, Hyung-Sin
    Culler, David E.
    Popa, Raluca Ada
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1375 - 1392
  • [40] Graph-based Delegation Authorization in Workflow
    Wei, Yonghe
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 3451 - 3455