Show simple item record

AuthorHu, Jinwei
AuthorKhan, Khaled M.
AuthorBai, Yun
AuthorZhang, Yan
Available date2024-04-02T06:04:50Z
Publication Date2012
Publication NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ResourceScopus
ISSN3029743
URIhttp://dx.doi.org/10.1007/978-3-642-31087-4_68
URIhttp://hdl.handle.net/10576/53800
AbstractAuthorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements.
Languageen
PublisherSpringer Berlin Heidelberg
SubjectSecurity requirements
Industrial engineering
Intelligent systems
TitleTracking and constraining authorization provenance
TypeConference Paper
Pagination669-678
Volume Number7345 LNAI


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record