Authorization and Obligation Policies in Dynamic Systems

The paper defines a language for specifying authorization and obligation policies of an intelligent agent acting in a changing environment and presents several ASP based algorithms for checking compliance of an event with a policy specified in this language. The language allows representation of defeasible policies and is based on theory of action and change.

[1]  Simon S. Lam,et al.  Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..

[2]  Sushil Jajodia,et al.  Incorporating Dynamic Constraints in the Flexible Authorization Framework , 2004, ESORICS.

[3]  Marcello Balduccini,et al.  Architectures for intelligent theory-based agents : Papers from the AAAI Spring Symposium , 2008 .

[4]  Jorge Lobo,et al.  A Formal Framework for Policy Analysis , 2008 .

[5]  Jorge Lobo,et al.  Toward a Formal Characterization of Policy Specification & Analysis , 2007 .

[6]  C. R. Ramakrishnan,et al.  Efficient policy analysis for administrative role based access control , 2007, CCS '07.

[7]  Kathi Fisler,et al.  Obligations and Their Interaction with Programs , 2007, ESORICS.

[8]  Joachim Biskup,et al.  Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.

[9]  Joseph Y. Halpern,et al.  Using First-Order Logic to Reason about Policies , 2008, TSEC.

[10]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[11]  Hudson Turner,et al.  Representing Actions in Logic Programs and Default Theories: A Situation Calculus Approach , 1997, J. Log. Program..

[12]  Alex M. Andrew,et al.  Knowledge Representation, Reasoning and Declarative Problem Solving , 2004 .

[13]  Jack Minker,et al.  Logic-Based Artificial Intelligence , 2000 .

[14]  James A. Hendler,et al.  Analyzing web access control policies , 2007, WWW '07.

[15]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[16]  Chitta Baral,et al.  Reasoning agents in dynamic domains , 2000 .

[17]  Marek J. Sergot,et al.  A logic-based calculus of events , 1989, New Generation Computing.

[18]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[19]  Dieter Gollmann,et al.  Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.

[20]  Antonis C. Kakas,et al.  ACLP: Abductive Constraint Logic Programming , 2000, J. Log. Program..

[21]  Andreas Matheus,et al.  How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[22]  C. R. Ramakrishnan,et al.  Policy Analysis for Administrative Role Based Access Control , 2006, CSFW.

[23]  Michael Gelfond,et al.  The AAA Architecture: An Overview , 2008, AAAI Spring Symposium: Emotion, Personality, and Social Behavior.