Access control in a core calculus of dependency
Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming
Audit-Based Access Control for Electronic Health Records
Electronic Notes in Theoretical Computer Science (ENTCS)
A framework for decentralized access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Access Control in a Core Calculus of Dependency
Electronic Notes in Theoretical Computer Science (ENTCS)
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
On optimizing compatible security policies in wireless networks
EURASIP Journal on Wireless Communications and Networking
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
Towards a declarative language and system for secure networking
NETB'07 Proceedings of the 3rd USENIX international workshop on Networking meets databases
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
AURA: a programming language for authorization and audit
Proceedings of the 13th ACM SIGPLAN international conference on Functional programming
Variations in Access Control Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
A Logical Approach to Dynamic Role-Based Access Control
AIMSA '08 Proceedings of the 13th international conference on Artificial Intelligence: Methodology, Systems, and Applications
Access control over uncertain data
Proceedings of the VLDB Endowment
Proceedings of the 15th ACM conference on Computer and communications security
Using web service enhancements to bridge business trust relationships
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Encoding information flow in Aura
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
Encoding information flow in AURA
ACM SIGPLAN Notices
A modal deconstruction of access control logics
FOSSACS'08/ETAPS'08 Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures
Using ASP for knowledge management with user authorization
Data & Knowledge Engineering
Towards a data-centric view of cloud security
CloudDB '10 Proceedings of the second international workshop on Cloud data management
A type system for access control views in object-oriented languages
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Dynamics in delegation and revocation schemes: a logical approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Soutei, a logic-based trust-management system
FLOPS'06 Proceedings of the 8th international conference on Functional and Logic Programming
A linear logic of authorization and knowledge
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A design phase for data sharing agreements
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
A proof-carrying file system with revocable and use-once certificates
STM'11 Proceedings of the 7th international conference on Security and Trust Management
New modalities for access control logics: permission, control and ratification
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Belief semantics of authorization logic
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Noninterference in a predicative polymorphic calculus for access control
Computer Languages, Systems and Structures
Hi-index | 0.00 |
Access control is central to security in computer systems.Over the years, there have been many efforts to explain andto improve access control, sometimes with logical ideas andtools. This paper is a partial survey and discussion of therole of logic in access control. It considers logical foundationsfor access control and their applications, in particularin languages for programming security policies.