2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.144
|View full text |Cite
|
Sign up to set email alerts
|

Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…We conclude in Sect. 3.2.4 with a case study in which we demonstrate how an authorization can be deduced in each context variation by the use of our reasoner [42,43].…”
Section: Postulate 1 (Normal Context) By Default the Context Is Normalmentioning
confidence: 99%
“…We conclude in Sect. 3.2.4 with a case study in which we demonstrate how an authorization can be deduced in each context variation by the use of our reasoner [42,43].…”
Section: Postulate 1 (Normal Context) By Default the Context Is Normalmentioning
confidence: 99%
“…us, access to OSNs is subject to user-specified policies. Access control systems used in IoT are RBAC (role-based) [21], organization-based (Or-BAC) [22], trust-based [23], capability-based (CapBAC) [24,25], and attribute-based access control (ABAC) [26,27]. In a centralized access control system, rights are assigned by a centralized entity that turns out to be a failure [28].…”
Section: Related Workmentioning
confidence: 99%
“…We define then TBox and ABox axioms with examples to illustrate their content and use. We conclude in section 3.3 with a case study in which we demonstrate how an authorization can be deduced in each context variation by the use of our reasoner [24], [25].…”
Section: B Subsumption Algorithm Sub δmentioning
confidence: 99%