Tracking and constraining authorization provenance
Author | Hu, Jinwei |
Author | Khan, Khaled M. |
Author | Bai, Yun |
Author | Zhang, Yan |
Available date | 2024-04-02T06:04:50Z |
Publication Date | 2012 |
Publication Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Resource | Scopus |
ISSN | 3029743 |
Abstract | Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements. |
Language | en |
Publisher | Springer Berlin Heidelberg |
Subject | Security requirements Industrial engineering Intelligent systems |
Type | Conference |
Pagination | 669-678 |
Volume Number | 7345 LNAI |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]