Updating logical databases
Database security
Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
Tractable Reasoning in Artificial Intelligence
Tractable Reasoning in Artificial Intelligence
An Access Control Model and Its Use in Representing Mental Health Application Access Policy
IEEE Transactions on Knowledge and Data Engineering
On the Expressive Power of the Unary Transformation Model
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Authorization in Distributed Systems: A Formal Approach
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
On the Minimality of Testing for Rights in Transformation Models
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Implementing prioritized logic programming
AI Communications
A Knowledge Based Formal Language for Securing Information Systems
KES '09 Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems: Part I
A modal logic for information system security
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Hi-index | 0.00 |
In this paper, we propose a logic based approach to specify and to reason about transformation of authorization policies. The authorization policy is specified using a policy base which comprises a finite set of facts and access constraints. We define the structure of the policy transformation and employ a model-based semantics to perform the transformation under the principle of minimal change. Furthermore, we extend model-based semantics by introducing preference ordering to resolve possible conflicts during transformation of policies. We also discuss the implementation of the model-based transformation approach and analyse the complexity of the algorithms introduced. Our system is able to represent both implicit and incomplete authorization requirements and reason about nonmonotonic properties.