عرض بسيط للتسجيلة

المؤلفHu, Jinwei
المؤلفKhan, Khaled M.
المؤلفBai, Yun
المؤلفZhang, Yan
تاريخ الإتاحة2024-04-02T06:04:50Z
تاريخ النشر2012
اسم المنشورLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
المصدرScopus
الرقم المعياري الدولي للكتاب3029743
معرّف المصادر الموحدhttp://dx.doi.org/10.1007/978-3-642-33383-5_18
معرّف المصادر الموحدhttp://hdl.handle.net/10576/53799
الملخصWe propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an RT policy, the checker is able to find all minimal satisfying sets, each of which uses credentials in a way consistent with given constraints. The checker leverages answer set programming, a declarative logic programming paradigm, to model and solve the problem. We also show preliminary experimental results: supporting usage-constraints on credentials incurs affordable overheads and the checker responds efficiently.
اللغةen
الناشرSpringer Berlin Heidelberg
الموضوعAnswer set programming
Compliance checking
Declarative logic
Nondeterministic finite automaton
Programming paradigms
Trust negotiations
Automata theory
Logic programming
Security of data
Model checking
العنوانCompliance checking for usage-constrained credentials in trust negotiation systems
النوعConference Paper
الصفحات290-305
رقم المجلد7483 LNCS


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة