Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)
DOI: 10.1109/policy.2005.5
|View full text |Cite
|
Sign up to set email alerts
|

An Audit Logic for Accountability

Abstract: We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(32 citation statements)
references
References 18 publications
0
32
0
Order By: Relevance
“…Last but not least, the controller must commit to the sticky policy for this category of data (S i (MyPolicy)(Ca) = (Id,Ve,Co 2 ,Cx) with Co 2 equal to the commitment in the DisclosureRequest event). Another important rule is the rule stating that the disclosure policy and identity must not be modified by internal events 9 .…”
Section: Compliancementioning
confidence: 99%
See 2 more Smart Citations
“…Last but not least, the controller must commit to the sticky policy for this category of data (S i (MyPolicy)(Ca) = (Id,Ve,Co 2 ,Cx) with Co 2 equal to the commitment in the DisclosureRequest event). Another important rule is the rule stating that the disclosure policy and identity must not be modified by internal events 9 .…”
Section: Compliancementioning
confidence: 99%
“…The interest of "a-posteriori" policy enforcement has been strongly advocated in [9] and [11], for example to cope with emergency actions that need to be taken in unexpected circumstances or to address the lack of control of the subjects in a distributed environment. The APPEL (A-Posteriori PoLicy Enforcement) core presented in [11] combines an audit logic with trust management techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To clearly specify access-control policies and reason about them formally, researchers have developed authorization logics [5,11,13,1,2]. In logic-based access-control systems, logical proofs constructed using access-control policies serve as capabilities for accessing resources.…”
Section: Introductionmentioning
confidence: 99%
“…We illustrate how the AC 2 framework can be used in a consultancy firm where a group of consultants produce and process confidential documents in a decentralized way. This framework was published in the International Journal of Information Security (IJIS) [2], as joint work with J. G. Cederquist, R. Corin, S. Etalle, J. I. den Hartog and G. Lenzini, and based on early versions of the AC 2 framework published in conference proceedings [1,25]. See also the acknowledgements of Chapter 2 in Section 2.8.…”
Section: Contributionsmentioning
confidence: 99%