2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.52
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Role-Based Access to Android Applications with JCHR

Abstract: In this paper we show how deductive and abductive reasoning in distributed authorisation can be efficiently ported to Android. Such logical-inference processes prove to be important tools due to the intrinsic autonomic-nature of these mobile devices. Both deduction and abduction are represented by using Constraint Handling Rules (CHR), a high-level declarative constraint programming-language, and implemented in JCHR (CHR embedded into Java). To represent credentials we elaborate on RT , a weighted Role-based T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Both deduction and abduction are expressed in Weighted Datalog and translated into CHR for execution. [BCMS14] show how this deductive and abductive reasoning can be efficiently ported to Android enabling distributed authorization. Both deduction and abduction are implemented as programs in a version of CHR that is embedded into Java (JCHR).…”
Section: B Hierarchical Rbacmentioning
confidence: 99%
“…Both deduction and abduction are expressed in Weighted Datalog and translated into CHR for execution. [BCMS14] show how this deductive and abductive reasoning can be efficiently ported to Android enabling distributed authorization. Both deduction and abduction are implemented as programs in a version of CHR that is embedded into Java (JCHR).…”
Section: B Hierarchical Rbacmentioning
confidence: 99%