Logics for authorizations and security

被引:0
|
作者
Bonatti, PA [1 ]
Samarati, P [1 ]
机构
[1] Univ Naples Federico II, Dipartimento Sci Fis, I-80126 Naples, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's computer systems and applications are based on a globally internet worked infrastructure, connecting remote parties through large-scale networks such as the World Wide Web. The network-based nature of applications improves information availability, but at the same time, it increases system vulnerability; calling for powerful and reliable tools for specifying and enforcing security properties. The expressive power and the formal foundations of logical formalisms are appealing in this context. Logics of various kinds have already been investigated and are being proposed as suitable means for tackling many facets of security. In this chapter, we survey some of the major applications of logics to the specification, verification, and enforcement of security policies, with special attention to the security issues that arise in open and distributed systems. We shall point out some practical aspects that may increase the usability of logic-based techniques and some possible directions for further research.
引用
收藏
页码:277 / 323
页数:47
相关论文
共 50 条
  • [1] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [2] Logics for Security and Privacy
    van der Torre, Leendert
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 1 - 7
  • [3] The logics of war and food (in)security
    Kemmerling, Birgit
    Schetter, Conrad
    Wirkus, Lars
    GLOBAL FOOD SECURITY-AGRICULTURE POLICY ECONOMICS AND ENVIRONMENT, 2022, 33
  • [4] JUDICIAL-REVIEW OF ICC SECURITY AUTHORIZATIONS - THE RELEVANCE OF UNAPPROVED CONTROL
    不详
    YALE LAW JOURNAL, 1958, 67 (04): : 715 - 731
  • [5] On BAN logics for industrial security protocols
    Agray, N
    van der Hoek, W
    de Vink, E
    FROM THEORY TO PRACTICE IN MULTI-AGENT SYSTEMS, 2002, 2296 : 29 - 36
  • [6] The Competing Logics of EU Security and Defence
    Duke, Simon W.
    SURVIVAL, 2019, 61 (02) : 123 - 142
  • [7] Temporal Logics of Knowledge and their Applications in Security
    Dixon, Clare
    Fernandez Gago, Mari-Carmen
    Fisher, Michael
    van der Hoek, Wiebe
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 186 : 27 - 42
  • [8] Logics of empowerment in the women, peace and security agenda
    Cueva, Alba Rosa Boer
    Griffin, Penny
    Shepherd, Laura J.
    JOURNAL OF INTERNATIONAL RELATIONS AND DEVELOPMENT, 2023, 26 (03) : 453 - 480
  • [9] The Security as a Device: Logics to Strengthen or Weaken Life
    Tejeda Gomez, Cristian Andres
    Merino Jara, Claudio Esteban
    Ojeda Rodriguez, Cristian Ricardo
    Santana Torres, Andrea Alejandra
    UTOPIA Y PRAXIS LATINOAMERICANA-REVISTA INTERNACIONAL DE FILOSOFIA IBEROAMERICANA Y TEORIA SOCIAL, 2018, 23 (83): : 97 - 109
  • [10] Response 3: The logics of security: A comment on Valverde
    Nelken, David
    CRIMINOLOGY & CRIMINAL JUSTICE, 2014, 14 (04) : 405 - 411