Managing Authorization Provenance: A Modal Logic Based Approach


In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding… (More)
DOI: 10.1109/ICTAI.2009.49


  • Presentations referencing similar topics