Computer Science – Logic in Computer Science
Scientific paper
2010-06-04
International Journal of Managing Information Technology 2.2 (2010) 23-30
Computer Science
Logic in Computer Science
8 pages
Scientific paper
10.5121/ijmit.2010.2203
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and authorization recycling. Based on our previously proposed logic, we present several case studies of this logic. By doing this, we show its expressiveness and usefulness in security arena.
No associations
LandOfFree
Expressiveness of a Provenance-Enabled Authorization Logic does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Expressiveness of a Provenance-Enabled Authorization Logic, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Expressiveness of a Provenance-Enabled Authorization Logic will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-722848