2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.15
|View full text |Cite
|
Sign up to set email alerts
|

An Authorization Logic With Explicit Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Our approach requires small and relatively straightforward changes to the inference rules of a logic, and we believe would be applicable to a variety of logics other than the one we showed here. Recently, various new authorization logics have been developed [16], [13], [15]. We plan to investigate general principles and methods for extending the syntax and proof rules of different logics with constraints in a manner similar to what we have shown in this paper.…”
Section: Discussion and Future Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Our approach requires small and relatively straightforward changes to the inference rules of a logic, and we believe would be applicable to a variety of logics other than the one we showed here. Recently, various new authorization logics have been developed [16], [13], [15]. We plan to investigate general principles and methods for extending the syntax and proof rules of different logics with constraints in a manner similar to what we have shown in this paper.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…We first define context to be a list of formulas and constraint formulas (lines 2-5), and then define operations on the context, e.g., for looking up a formula (lines 7-8). Next, we define logical connectives (lines [10][11][12][13][14]. Finally, we define the set of sequent rules.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Temporal extensions of our logics, e.g. like [18], will allow to check whether a promise is violated in a given trace (e.g. the deadline passed).…”
Section: Related Workmentioning
confidence: 99%
“…To clearly specify access-control policies and reason about them formally, researchers have developed authorization logics [5,11,13,1,2]. In logic-based access-control systems, logical proofs constructed using access-control policies serve as capabilities for accessing resources.…”
Section: Introductionmentioning
confidence: 99%