A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
We present a constructive authorization logic where the meanings of connectives are defined by their associated inference rules. This ensures that the logical reading of access c...