Publication: Research - peer-review › Article in proceedings – Annual report year: 2012
When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abstracts from the specific setting, and groups together many of the existing ways for combining policies. Moreover, we propose going one step further, by twisting the 4-valued logic and obtaining a more traditional approach that might therefore be more appropriate for analysis.
|Title of host publication||PLAS '12 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security|
|Number of pages||4|
|Publisher||Association for Computing Machinery|
|Pages||Article No. 5|
|Workshop||7th Workshop on Programming Languages and Analysis for Security (PLAS 2012)|
|Period||15/06/12 → …|
|Citations||Web of Science® Times Cited: No match on DOI|
- Access control, Computer programming languages, Network security, Security systems
Loading map data...