Show simple item record

AuthorHu, Jinwei
AuthorKhan, Khaled M.
AuthorBai, Yun
AuthorZhang, Yan
Available date2024-04-02T06:04:50Z
Publication Date2012
Publication NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ResourceScopus
ISSN3029743
URIhttp://dx.doi.org/10.1007/978-3-642-31087-4_68
URIhttp://hdl.handle.net/10576/53800
AbstractAuthorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements.
Languageen
PublisherSpringer Berlin Heidelberg
SubjectSecurity requirements
Industrial engineering
Intelligent systems
TitleTracking and constraining authorization provenance
TypeConference
Pagination669-678
Volume Number7345 LNAI
dc.accessType Abstract Only


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record