2010 23rd IEEE Computer Security Foundations Symposium 2010
DOI: 10.1109/csf.2010.17
|View full text |Cite
|
Sign up to set email alerts
|

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques

Abstract: Abstract-Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine these outcomes within a more continuous space. In this paper, we develop a formal model that allows us to quantitatively reason about the outcomes of the policy enforcement process in both absolute (i.e., user to ideal case) and relative (i.e., user to user) terms. Within this framework, it becomes possible to quantify, e.g., th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
references
References 36 publications
0
0
0
Order By: Relevance