Logic in Access Control (Tutorial Notes)
From MaRDI portal
Publication:3184786
DOI10.1007/978-3-642-03829-7_5zbMath1252.68103OpenAlexW1862312605MaRDI QIDQ3184786
Publication date: 22 October 2009
Published in: Foundations of Security Analysis and Design V (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03829-7_5
Modal logic (including the logic of norms) (03B45) Data encryption (aspects in computer science) (68P25) Logic of natural languages (03B65) Logic in computer science (03B70)
Related Items (2)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Notions of computation and monads
- Propositional lax logic
- Access Control in a Core Calculus of Dependency
- Variations in Access Control Logic
- Beyond proof-of-compliance: security analysis in trust management
- A Certified Distributed Security Logic for Authorizing Code
- Protection in operating systems
- Computational types from a logical perspective
- Naming and Identity in Epistemic Logics Part I: The Propositional Case
- AURA
- A Modal Deconstruction of Access Control Logics
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- Information Security
- A Logic of Access Control
This page was built for publication: Logic in Access Control (Tutorial Notes)