Analysis and implementation of a formal authorization policy design approach

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

In [1], we proposed a formal approach to specify authorization policies and their transformations. In this paper, we discuss the implementation issues of this approach and analyse the complexities of the algorithms introduced.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publicationSecond Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings
EditorsVijay Varadharajan, Josef Pieprzyk, Yi Mu
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages14-25
Number of pages12
ISBN (Electronic)9783540692379
ISBN (Print)3540632328, 9783540632320
DOIs
Publication statusPublished - Jul 1997
Externally publishedYes
Event2nd Australasian Conference on Information Security and Privacy, ACISP - 1997 - Sydney, Australia
Duration: 7 Jul 19979 Jul 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1270
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd Australasian Conference on Information Security and Privacy, ACISP - 1997
Country/TerritoryAustralia
CitySydney
Period7/07/979/07/97

Keywords

  • Authorization policy
  • Logic based specification
  • Security
  • Transformations

Fingerprint

Dive into the research topics of 'Analysis and implementation of a formal authorization policy design approach'. Together they form a unique fingerprint.

Cite this