Abstract
When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abstracts from the specific setting, and groups together many of the existing ways for combining policies. Moreover, we propose going one step further, by twisting the 4-valued logic and obtaining a more traditional approach that might therefore be more appropriate for analysis.
Original language | English |
---|---|
Title of host publication | PLAS '12 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security |
Number of pages | 4 |
Publisher | Association for Computing Machinery |
Publication date | 2012 |
Pages | Article No. 5 |
ISBN (Print) | 978-1-4503-1441-1 |
DOIs | |
Publication status | Published - 2012 |
Event | 7th Workshop on Programming Languages and Analysis for Security (PLAS 2012) - Beijing, China Duration: 15 Jun 2012 → … |
Workshop
Workshop | 7th Workshop on Programming Languages and Analysis for Security (PLAS 2012) |
---|---|
Country/Territory | China |
City | Beijing |
Period | 15/06/2012 → … |
Keywords
- Access control
- Computer programming languages
- Network security
- Security systems