A logic-based calculus of events
New Generation Computing
Logics of time and computation
Logics of time and computation
Efficient checking of temporal integrity constraints using bounded history encoding
ACM Transactions on Database Systems (TODS)
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Some Alternative Formulations of the Event Calculus
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part II
Integrating Flexible Support for Security Policies into the Linux Operating System
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Temporal stratification tests for linear and branching-time deductive databases
Theoretical Computer Science
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
Authorisation and Conflict Resolution for Hierarchical Domains
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
A simple and expressive semantic framework for policy composition in access control
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
The role of abduction in declarative authorization policies
PADL'08 Proceedings of the 10th international conference on Practical aspects of declarative languages
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
A logic for state-modifying authorization policies
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Security policy refinement using data integration: a position paper
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
CNL4DSA: a controlled natural language for data sharing agreements
Proceedings of the 2010 ACM Symposium on Applied Computing
Distributed abductive reasoning with constraints
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Distributed abductive reasoning with constraints
DALT'10 Proceedings of the 8th international conference on Declarative agent languages and technologies VIII
Refinement of history-based policies
Logic programming, knowledge representation, and nonmonotonic reasoning
Multi-agent abductive reasoning with confidentiality
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
Policy refinement: decomposition and operationalization for dynamic domains
Proceedings of the 7th International Conference on Network and Services Management
A design phase for data sharing agreements
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
The scientific contribution of marek sergot
Logic Programs, Norms and Action
Logical approaches to authorization policies
Logic Programs, Norms and Action
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations
International Journal of Mobile Computing and Multimedia Communications
Knowledge-Based Policy Conflict Analysis in Mobile Social Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take account of obligations and authorizations, (iii) include a dynamic system model, and (iv) give useful diagnostic information. We present a logic-based policy analysis framework which satisfies these requirements, showing how many significant policy-related properties can be analysed, and we give details of a prototype implementation.