Logic in Access Control (Tutorial Notes)
From MaRDI portal
Publication:3184786
DOI10.1007/978-3-642-03829-7_5zbMath1252.68103MaRDI QIDQ3184786
Publication date: 22 October 2009
Published in: Foundations of Security Analysis and Design V (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03829-7_5
03B45: Modal logic (including the logic of norms)
68P25: Data encryption (aspects in computer science)
03B65: Logic of natural languages
03B70: Logic in computer science
Uses Software
Cites Work
- Notions of computation and monads
- Propositional lax logic
- Access Control in a Core Calculus of Dependency
- Variations in Access Control Logic
- Beyond proof-of-compliance: security analysis in trust management
- A Certified Distributed Security Logic for Authorizing Code
- Protection in operating systems
- Computational types from a logical perspective
- Naming and Identity in Epistemic Logics Part I: The Propositional Case
- AURA
- A Modal Deconstruction of Access Control Logics
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- Information Security
- A Logic of Access Control
- Unnamed Item
- Unnamed Item
- Unnamed Item