Compliance checking for usage-constrained credentials in trust negotiation systems
المؤلف | Hu, Jinwei |
المؤلف | Khan, Khaled M. |
المؤلف | Bai, Yun |
المؤلف | Zhang, Yan |
تاريخ الإتاحة | 2024-04-02T06:04:50Z |
تاريخ النشر | 2012 |
اسم المنشور | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
المصدر | Scopus |
الرقم المعياري الدولي للكتاب | 3029743 |
الملخص | We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an RT policy, the checker is able to find all minimal satisfying sets, each of which uses credentials in a way consistent with given constraints. The checker leverages answer set programming, a declarative logic programming paradigm, to model and solve the problem. We also show preliminary experimental results: supporting usage-constraints on credentials incurs affordable overheads and the checker responds efficiently. |
اللغة | en |
الناشر | Springer Berlin Heidelberg |
الموضوع | Answer set programming Compliance checking Declarative logic Nondeterministic finite automaton Programming paradigms Trust negotiations Automata theory Logic programming Security of data Model checking |
النوع | Conference |
الصفحات | 290-305 |
رقم المجلد | 7483 LNCS |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]