A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
ITtalks: A Case Study in the Semantic Web and DAML+OIL
IEEE Intelligent Systems
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
An Axiomatic Basis for Reasoning about Trust in PKIs
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
ITTALKS: An Application of Agents in the Semantic Web
ESAW '01 Proceedings of the Second International Workshop on Engineering Societies in the Agents World II
Distributed credential chain discovery in trust management
Journal of Computer Security
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Supporting conditional delegation in secure workflow management systems
Proceedings of the tenth ACM symposium on Access control models and technologies
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Safe Credential-Based Trust Protocols: A Framework
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Xcellog: A deductive spreadsheet system
The Knowledge Engineering Review
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
A role-based XACML administration and delegation profile and its enforcement architecture
Proceedings of the 2009 ACM workshop on Secure web services
Artificial Intelligence
Security in the Semantic Web using OWL
Information Security Tech. Report
A nested token-based delegation scheme for cascaded delegation in mobile agent environments
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Relaxed safeness in Datalog-based policies
RuleML'11 Proceedings of the 5th international conference on Rule-based modeling and computing on the semantic web
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Deductive spreadsheets using tabled logic programming
ICLP'06 Proceedings of the 22nd international conference on Logic Programming
A security infrastructure for trust management in multi-agent systems
Trusting Agents for Trusting Electronic Societies
Privacy preserving of trust management credentials based on trusted computing
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Belief semantics of authorization logic
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Information flow in trust management systems
Journal of Computer Security - CSF 2010
Hi-index | 0.00 |
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trust-management system. DL is a logic-based knowledge representation (i.e., language) for authorization in large-scale, open, distributed systems.As introduced in [Li, Feigenbaum, and Grosof 1999], DL inferencing is computationally intractable and highly impractical to implement. We introduce a new version of Delegation Logic that remedies these difficulties. To achieve this, we impose a syntactic restriction and redefine the semantics somewhat. We show that, for this revised version of DL, inferencing is computationally tractable under the same commonly met restrictions for which Ordinary Logic Programs (OLP) inferencing is tractable (e.g., Datalog and bounded number of logical variables per rule).We give implementation architecture for this version of DL; it uses a delegation compiler from DL to OLP and can modularly exploit a variety of existing OLP inference engines. As proof of concept, we have implemented a large expressive subset of this version of DL, using this architecture.