Tracking and constraining authorization provenance
| Author | Hu, Jinwei |
| Author | Khan, Khaled M. |
| Author | Bai, Yun |
| Author | Zhang, Yan |
| Available date | 2024-04-02T06:04:50Z |
| Publication Date | 2012 |
| Publication Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
| Resource | Scopus |
| ISSN | 3029743 |
| Abstract | Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements. |
| Language | en |
| Publisher | Springer Berlin Heidelberg |
| Subject | Security requirements Industrial engineering Intelligent systems |
| Type | Conference |
| Pagination | 669-678 |
| Volume Number | 7345 LNAI |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||
This item appears in the following Collection(s)
-
Computer Science & Engineering [2520 items ]

