An overview of transaction logic
Theoretical Computer Science - Special issue on formal methods in databases and software engineering
Tabled evaluation with delaying for general logic programs
Journal of the ACM (JACM)
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The role of trust management in distributed systems security
Secure Internet programming
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
OLD Resolution with Tabulation
Proceedings of the Third International Conference on Logic Programming
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Analysis of SPKI/SDSI Certificates Using Model Checking
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Policy Analysis for Administrative Role Based Access Control
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Prediction is deduction but explanation is abduction
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 2
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Verified enforcement of stateful information release policies
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Verified enforcement of stateful information release policies
ACM SIGPLAN Notices
Expressive policy analysis with enhanced system dynamicity
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
On the Construction and Verification of Self-modifying Access Control Policies
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
The role of abduction in declarative authorization policies
PADL'08 Proceedings of the 10th international conference on Practical aspects of declarative languages
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Semi-automatic synthesis of security policies by invariant-guided abduction
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Program synthesis in administration of higher-order permissions
Proceedings of the 16th ACM symposium on Access control models and technologies
Stateful authorization logic: proof theory and a case study
STM'10 Proceedings of the 6th international conference on Security and trust management
Formal specification and validation of security policies
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Stateful authorization logic --Proof theory and a case study
Journal of Computer Security - STM'10
Hi-index | 0.00 |
We present a logic for specifying policies where access requests can have effects on the authorization state. The logic is semantically defined by a mapping to Transaction Logic. Using this approach, updates to the state are factored out of the resource guard, thus enhancing maintainability and facilitating more expressive policies that take the history of access requests into account. We also present a sound and complete proof system for reasoning about sequences of access requests. This gives rise to a goal-oriented algorithm for finding minimal sequences that lead to a specified target authorization state.