Logics for authorizations and security

被引:0
|
作者
Bonatti, PA [1 ]
Samarati, P [1 ]
机构
[1] Univ Naples Federico II, Dipartimento Sci Fis, I-80126 Naples, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's computer systems and applications are based on a globally internet worked infrastructure, connecting remote parties through large-scale networks such as the World Wide Web. The network-based nature of applications improves information availability, but at the same time, it increases system vulnerability; calling for powerful and reliable tools for specifying and enforcing security properties. The expressive power and the formal foundations of logical formalisms are appealing in this context. Logics of various kinds have already been investigated and are being proposed as suitable means for tackling many facets of security. In this chapter, we survey some of the major applications of logics to the specification, verification, and enforcement of security policies, with special attention to the security issues that arise in open and distributed systems. We shall point out some practical aspects that may increase the usability of logic-based techniques and some possible directions for further research.
引用
收藏
页码:277 / 323
页数:47
相关论文
共 50 条
  • [31] Reasoning on Weighted Delegatable Authorizations
    Ruan, Chun
    Varadharajan, Vijay
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2009, 5690 : 279 - 286
  • [32] RxLegal: Emergency Use Authorizations
    Gabay, Michael
    Vora, Niam
    HOSPITAL PHARMACY, 2023, 58 (01) : 16 - 17
  • [33] EASy: Expert Authorizations System
    Altfeld, J
    Landon, DE
    Daniels, CJ
    PROCEEDINGS OF THE THIRTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE, VOLS 1 AND 2, 1996, : 1421 - 1432
  • [34] Prior Authorizations: A Necessary Evil?
    Wilens, Timothy E.
    Wilens, Kai
    Woodworth, K. Yvonne
    Chippari, Victoria
    Firmin, Elizabeth S.
    JOURNAL OF THE AMERICAN ACADEMY OF CHILD AND ADOLESCENT PSYCHIATRY, 2020, 59 (09): : 1005 - 1007
  • [35] Social life of engineering authorizations
    Stubblefield, William A.
    Rogers, Karen S.
    Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS, 2000, : 9 - 19
  • [36] Flexible Authorizations with Logic Program
    Zhang, Mingsheng
    Chen, Wu
    Wang, Yisong
    Zhang, Mingyi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 259 - +
  • [37] Defence, Security and Economics. Enrico Barone and the War of Logics and Emotion
    Patalano, Rosario
    HISTORY OF ECONOMIC THOUGHT AND POLICY, 2018, (01) : 140 - 142
  • [38] Model checking temporal logics of knowledge and its application in security verification
    Wu, LJ
    Su, KL
    Chen, QL
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 349 - 354
  • [39] Power, trust, and network complexity: three logics of hedging in Asian security
    Jackson, Van
    INTERNATIONAL RELATIONS OF THE ASIA-PACIFIC, 2014, 14 (03) : 331 - 356
  • [40] Policing and the logics of violence: a comparative analysis of public security reform in Brazil
    Wolff, Michael Jerome
    POLICING & SOCIETY, 2017, 27 (05): : 560 - 574