메뉴 건너뛰기




Volumn 18, Issue 4, 2010, Pages 619-665

SecPAL: Design and semantics of a decentralized authorization language

Author keywords

access control; Authorization language; policy; trust management

Indexed keywords

AUTHORIZATION LANGUAGE; CONSTRAINT LOGIC PROGRAMMING; DATALOG; DECENTRALIZED AUTHORIZATION; DEDUCTION RULE; DELEGATORS; EXECUTION STRATEGIES; FLEXIBLE SUPPORTS; NATURAL LANGUAGES; RECURSIONS; TRUST MANAGEMENT;

EID: 77954754889     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2009-0364     Document Type: Conference Paper
Times cited : (94)

References (66)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi, On SDSI's linked local name spaces, Journal of Computer Security 6(1,2) (1998), 3-22.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-22
    • Abadi, M.1
  • 5
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P.J. Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security 6(4) (2003), 501-546.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 6
    • 33947674219 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management and its application to electronic health records
    • (Ph.D. thesis), Computer Laboratory, University of Cambridge available at:
    • M.Y. Becker, Cassandra: Flexible trust management and its application to electronic health records (Ph.D. thesis), Technical Report UCAM-CL-TR-648, Computer Laboratory, University of Cambridge, 2005; available at: www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-648.html.
    • (2005) Technical Report UCAM-CL-TR-648
    • Becker, M.Y.1
  • 7
    • 33947705701 scopus 로고    scopus 로고
    • Information governance in NHS's NPfIT: A case for policy specification
    • M.Y. Becker, Information governance in NHS's NPfIT: A case for policy specification, International Journal of Medical Informatics 76(5,6) (2007), 432-437.
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 432-437
    • Becker, M.Y.1
  • 8
    • 34548051301 scopus 로고    scopus 로고
    • SecPAL: Design and semantics of a decentralized authorization language
    • available at: research.microsoft.
    • M.Y. Becker, C. Fournet and A.D. Gordon, SecPAL: Design and semantics of a decentralized authorization language, Technical report, Microsoft Research, 2006; available at: research.microsoft. com/research/pubs/view.aspx?tr-id=1166.
    • (2006) Technical Report
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 13
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management, applied to electronic health records
    • M.Y. Becker and P. Sewell, Cassandra: Flexible trust management, applied to electronic health records, in: IEEE Computer Security Foundations Workshop, 2004, pp. 139-154.
    • (2004) IEEE Computer Security Foundations Workshop , pp. 139-154
    • Becker, M.Y.1    Sewell, P.2
  • 14
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • The MITRE Corporation, July
    • D.E. Bell and L.J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical report, The MITRE Corporation, July 1975.
    • (1975) Technical Report
    • Bell, D.E.1    Lapadula, L.J.2
  • 15
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • E. Bertino, C. Bettini, E. Ferrari and P. Samarati, An access control model supporting periodicity constraints and temporal reasoning, ACM Trans. Database Syst. 23(3) (1998), 231-285.
    • (1998) ACM Trans. Database Syst. , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 22
    • 0037303408 scopus 로고    scopus 로고
    • The PERMIS X.509 role based privilege management infrastructure
    • D.W. Chadwick and A. Otenko, The PERMIS X.509 role based privilege management infrastructure, Future Generation Computer Systems 19(2) (2003), 277-289.
    • (2003) Future Generation Computer Systems , vol.19 , Issue.2 , pp. 277-289
    • Chadwick, D.W.1    Otenko, A.2
  • 23
    • 0029695436 scopus 로고    scopus 로고
    • Tabled evaluation with delaying for general logic programs
    • W. Chen and D. S. Warren, Tabled evaluation with delaying for general logic programs, Journal of the ACM 43(1) (1996), 20-74.
    • (1996) Journal of the ACM , vol.43 , Issue.1 , pp. 20-74
    • Chen, W.1    Warren, D.S.2
  • 27
    • 24644431553 scopus 로고    scopus 로고
    • Policies, models and languages for access control
    • Databases in Networked Information Systems
    • S.D.C. di Vimercati, P. Samarati and S. Jajodia, Policies, models and languages for access control, in: Databases in Networked Information Systems, Lecture Notes in Computer Science, Vol.3433, 2005, pp. 225-237.
    • (2005) Lecture Notes in Computer Science , vol.3433 , pp. 225-237
    • Di Vimercati, S.D.C.1    Samarati, P.2    Jajodia, S.3
  • 28
    • 0023561596 scopus 로고
    • Extension tables: Memo relations in logic programming
    • S.W. Dietrich, Extension tables: Memo relations in logic programming, in: Symposium on Logic Programming, 1987, pp. 264-272.
    • (1987) Symposium on Logic Programming , pp. 264-272
    • Dietrich, S.W.1
  • 29
    • 35048838926 scopus 로고    scopus 로고
    • A unified approach to trust delegation and authorization in large-scale grids
    • Microsoft Corporation September available at:
    • B. Dillaway, A unified approach to trust, delegation and authorization in large-scale grids, Whitepaper, Microsoft Corporation, September 2006; available at: research.microsoft.com/projects/ SecPAL/.
    • (2006) Whitepaper
    • Dillaway, B.1
  • 36
    • 48949100055 scopus 로고    scopus 로고
    • DKAL: Distributed-knowledge authorization language
    • Microsoft Research
    • Y. Gurevich and I. Neeman, DKAL: Distributed-knowledge authorization language, Technical Report MSR-TR-2007-2116, Microsoft Research, 2007.
    • (2007) Technical Report MSR-TR- 2007-2116
    • Gurevich, Y.1    Neeman, I.2
  • 39
    • 35048832698 scopus 로고    scopus 로고
    • Syracuse University, available at:
    • P. Humenn, The formal semantics of XACML (draft), Syracuse University, 2003; available at: lists.oasis-open.org/archives/xacml/200310/ pdf00000.pdf.
    • (2003) The Formal Semantics of XACML (Draft)
    • Humenn, P.1
  • 41
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M.J. Maher, Constraint logic programming: A survey, Journal of Logic Programming 19(20) (1994), 503-581.
    • (1994) Journal of Logic Programming , vol.19 , Issue.20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 44
    • 0024626557 scopus 로고
    • Unification: A multidisciplinary survey
    • K. Knight, Unification: a multidisciplinary survey, ACM Computing Surveys (CSUR) 21(1) (1989), 93-124.
    • (1989) ACM Computing Surveys (CSUR) , vol.21 , Issue.1 , pp. 93-124
    • Knight, K.1
  • 45
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows and E. Wobber, Authentication in distributed systems: theory and practice, ACM Trans. Computer Syst. 10(4) (1992), 265-310.
    • (1992) ACM Trans. Computer Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 48
    • 0037974359 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust management languages
    • N. Li and J.C. Mitchell, Datalog with constraints: A foundation for trust management languages, in: Proc. PADL, 2003, pp. 58-73.
    • (2003) Proc. PADL , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 50
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role-based management and role-based access control
    • E.C. Lupu and M. Sloman, Reconciling role-based management and role-based access control, in: ACM Workshop on Role-based Access Control, 1997, pp. 135-141.
    • (1997) ACM Workshop on Role-based Access Control , pp. 135-141
    • Lupu, E.C.1    Sloman, M.2
  • 52
    • 77954707049 scopus 로고    scopus 로고
    • Microsoft Corporation, available at: research.
    • Microsoft Corporation, SecPAL Research Release for Microsoft .NET, 2007; available at: research. microsoft.com/projects/SecPAL/.
    • (2007) SecPAL Research Release for Microsoft .NET
  • 54
    • 33745883651 scopus 로고    scopus 로고
    • Version 2.0 core specification, available at:
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0 core specification, 2005; available at: www.oasis-open.org/committees/xacml/.
    • (2005) EXtensible Access Control Markup Language (XACML)
  • 57
    • 0001821002 scopus 로고
    • Constraint databases: A survey
    • Semantics in Databases, Springer
    • P. Z. Revesz, Constraint databases: A survey, in: Semantics in Databases, Lecture Notes in Computer Science, Vol.1358, Springer, 1995, pp. 209-246.
    • (1995) Lecture Notes in Computer Science , vol.1358 , pp. 209-246
    • Revesz, P.Z.1
  • 58
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate certificate revocations lists?
    • R.L. Rivest, Can we eliminate certificate revocations lists?, in: Financial Cryptography, 1998, pp. 178-183.
    • (1998) Financial Cryptography , pp. 178-183
    • Rivest, R.L.1
  • 62
    • 0242453160 scopus 로고    scopus 로고
    • Memoing evaluation for constraint extensions of Datalog
    • D. Toman, Memoing evaluation for constraint extensions of Datalog, Constraints 2(3,4) (1997), 337-359.
    • (1997) Constraints , vol.2 , Issue.3-4 , pp. 337-359
    • Toman, D.1
  • 63
    • 0038842147 scopus 로고
    • Assigning an appropriate meaning to database logic with negation
    • H. Yamada, Y. Kambayashi and S. Ohta, eds, World Scientific
    • J.D. Ullman, Assigning an appropriate meaning to database logic with negation, in: Computers as Our Better Partners, H. Yamada, Y. Kambayashi and S. Ohta, eds, World Scientific, 1994, pp. 216- 225.
    • (1994) Computers As Our Better Partners , pp. 216-225
    • Ullman, J.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.