Compliance checking for usage-constrained credentials in trust negotiation systems
| المؤلف | Hu, Jinwei |
| المؤلف | Khan, Khaled M. |
| المؤلف | Bai, Yun |
| المؤلف | Zhang, Yan |
| تاريخ الإتاحة | 2024-04-02T06:04:50Z |
| تاريخ النشر | 2012 |
| اسم المنشور | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
| المصدر | Scopus |
| الرقم المعياري الدولي للكتاب | 3029743 |
| الملخص | We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an RT policy, the checker is able to find all minimal satisfying sets, each of which uses credentials in a way consistent with given constraints. The checker leverages answer set programming, a declarative logic programming paradigm, to model and solve the problem. We also show preliminary experimental results: supporting usage-constraints on credentials incurs affordable overheads and the checker responds efficiently. |
| اللغة | en |
| الناشر | Springer Berlin Heidelberg |
| الموضوع | Answer set programming Compliance checking Declarative logic Nondeterministic finite automaton Programming paradigms Trust negotiations Automata theory Logic programming Security of data Model checking |
| النوع | Conference |
| الصفحات | 290-305 |
| رقم المجلد | 7483 LNCS |
الملفات في هذه التسجيلة
| الملفات | الحجم | الصيغة | العرض |
|---|---|---|---|
|
لا توجد ملفات لها صلة بهذه التسجيلة. |
|||
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2519 items ]

