What does a conditional knowledge base entail?
Artificial Intelligence
Handbook of logic in artificial intelligence and logic programming (vol. 3)
Nonmonotonic reasoning, conditional objects and possibility theory
Artificial Intelligence
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Handling Hard Rules and Default Rules in Possibilistic Logic
IPMU'94 Selected papers from the 5th International Conference on Processing and Management of Uncertainty in Knowledge-Based Systems, Advances in Intelligent Computing
System Z: A Natural Ordering of Defaults with Tractable Applications to Nonmonotonic Reasoning
Proceedings of the 3rd Conference on Theoretical Aspects of Reasoning about Knowledge
Supporting Multiple Access Control Policies in Database Systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Weakening conflicting information for iterated revision and knowledge integration
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 1
Resolving constraint conflicts
Proceedings of the ninth ACM symposium on Access control models and technologies
A reconstruction-based algorithm for classification rules hiding
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
High Level Conflict Management Strategies in Advanced Access Control Models
Electronic Notes in Theoretical Computer Science (ENTCS)
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
Flexible Resolution of Authorisation Conflicts in Distributed Systems
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Test generation for network security rules
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Access controls for privacy protection in pervasive environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Inferring with inconsistent OWL DL ontology: a multi-valued logic approach
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Hi-index | 0.00 |
In the health care sector, access to medical information is more and more electronically achieved. Therefore, it is very important to define security policies which restrict access to pieces of information in order to guarantee security properties like confidentiality or integrity properties. These security policies are not always free of conflicts, in particular in the presence of exceptional situations.This paper proposes tools for access control, based on the notion of roles, in the possibilistic logic framework. We first show how to formalize basic concepts of security policies. Then we present two approaches for dealing with conflicts based on a stratification of security policy's rules. Finally, an example of health care is presented.