Tracking and constraining authorization provenance

  • Authors:
  • Jinwei Hu;Khaled M. Khan;Yun Bai;Yan Zhang

  • Affiliations:
  • Department of Computer Science and Engineering, Qatar University, Qatar;Department of Computer Science and Engineering, Qatar University, Qatar;School of Computing and Mathematics, University of Western Sydney, Australia;School of Computing and Mathematics, University of Western Sydney, Australia

  • Venue:
  • IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements.