Proceedings of the Fourth ACM Workshop on Formal Methods in Security 2006
DOI: 10.1145/1180337.1180342
|View full text |Cite
|
Sign up to set email alerts
|

Defeasible security policy composition for web services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0
1

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 19 publications
0
17
0
1
Order By: Relevance
“…A hierarchy of pairs of access lists is created; a firewall policy is assembled by forming a single access list from the pairs along a path in the hierarchy from a leaf to the root. Another example is in the policy language of Lee et al [18].…”
Section: Related Workmentioning
confidence: 99%
“…A hierarchy of pairs of access lists is created; a firewall policy is assembled by forming a single access list from the pairs along a path in the hierarchy from a leaf to the root. Another example is in the policy language of Lee et al [18].…”
Section: Related Workmentioning
confidence: 99%
“…The default property can be used to express default rules such as an access is denied unless explicitly is authorized. Lee et al [26] use defeasible logic to represent and compose policies for web services. They state that using defeasible rules simplify the composition of policies and can be fully automated.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Especially in the area of web service composition, the composition of security policies plays an important role, as different policies have to be combined for every combination of web services (e.g. [23], [24]). We adopt some of these concepts into our distributed CEP system, which allows us to inherit access restrictions during the different processing steps in the operators of our system.…”
Section: Related Workmentioning
confidence: 99%