Abstract
In this article we show how to model a range of notions in the context of delegation and revocation applied to security scenarios. We demonstrate how a range of delegation-revocation models and policies may be represented in pictorial form and formally represented in terms of reactive Kripke models and a first-order policy specification language. We translate first-order representations of our reactive Kripke models into an equivalent Answer Set Programming form that enables users to apply flexibly well-defined definitions of predicates to represent their requirements in terms of delegation-revocation policy specification.
| Original language | English |
|---|---|
| Pages (from-to) | 89-116 |
| Number of pages | 28 |
| Journal | Journal of Logic and Computation |
| Volume | 24 |
| Issue number | 1 |
| DOIs | |
| State | Published - Feb 2014 |
Keywords
- Delegation
- Policies
- answer set programming
- security
Fingerprint
Dive into the research topics of 'Reasoning about delegation and revocation schemes in answer set programming'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver