One Useful Logic That Defines Its Own Truth
MFCS '08 Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science
Specifying and Composing Non-functional Requirements in Model-Based Development
SC '09 Proceedings of the 8th International Conference on Software Composition
Operational Semantics for DKAL: Application and Analysis
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Modelling dynamic access control policies for web-based collaborative systems
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Logic of infons: The propositional case
ACM Transactions on Computational Logic (TOCL)
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Confidentiality-preserving proof theories for distributed proof systems
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Yuri, logic, and computer science
Fields of logic and computation
Fields of logic and computation
DKAL and Z3: a logic embedding experiment
Fields of logic and computation
Refinement of history-based policies
Logic programming, knowledge representation, and nonmonotonic reasoning
STM'10 Proceedings of the 6th international conference on Security and trust management
Opacity analysis in trust management systems
ISC'11 Proceedings of the 14th international conference on Information security
ASLan++ -- a formal security specification language for distributed systems
FMCO'10 Proceedings of the 9th international conference on Formal Methods for Components and Objects
On the verification of security-aware E-services
Journal of Symbolic Computation
Probing attacks on multi-agent systems using electronic institutions
DALT'11 Proceedings of the 9th international conference on Declarative Agent Languages and Technologies
Datalog: a perspective and the potential
Datalog 2.0'12 Proceedings of the Second international conference on Datalog in Academia and Industry
Declarative secure distributed information systems
Computer Languages, Systems and Structures
Evaluating role based authorization programs
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
DKAL*: constructing executable specifications of authorization protocols
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Belief semantics of authorization logic
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Information flow in trust management systems
Journal of Computer Security - CSF 2010
Hi-index | 0.01 |
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authorization languages in the literature. Yet its query algorithm is within the same bounds of computational complexity as e.g. that of SecPAL. DKAL's communication is targeted which is beneficial for security and for liability protection. DKAL enables flexible use of functions; in particular principals can quote (to other principals) whatever has been said to them. DKAL strengthens the trust delegation mechanism of SecPAL. A novel information order contributes to succinctness. DKAL introduces a semantic safety condition that guarantees the termination of the query algorithm.