A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Constraining Credential Usage in Logic-Based Access Control
2010
2010 23rd IEEE Computer Security Foundations Symposium
Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the consequences of these policies are derived using logical inference rules. Proofs in authorization logics can serve as capabilities for gaining access to resources. Because a proof is derived from a set of credentials possibly issued by different parties, the issuer of a
doi:10.1109/csf.2010.18
dblp:conf/csfw/BauerJS10
fatcat:4bmrgxgdsrg5nmeuacyedertsq