Today's computer systems and applications are based on a globally internet worked infrastructure, connecting remote parties through large-scale networks such as the World Wide Web. The network-based nature of applications improves information availability, but at the same time, it increases system vulnerability; calling for powerful and reliable tools for specifying and enforcing security properties. The expressive power and the formal foundations of logical formalisms are appealing in this context. Logics of various kinds have already been investigated and are being proposed as suitable means for tackling many facets of security. In this chapter, we survey some of the major applications of logics to the specification, verification, and enforcement of security policies, with special attention to the security issues that arise in open and distributed systems. We shall point out some practical aspects that may increase the usability of logic-based techniques and some possible directions for further research.

Logics for Authorizations and Security / P. Bonatti, P. Samarati - In: Logics for Emerging Applications of Databases / [a cura di] J. Chomicki, R. van der Meyden, G. Saake. - [s.l] : Springer-Verlag, 2004. - ISBN 9783540007050. - pp. 277-323 (( convegno Dagstuhl Seminar on Logics for Emerging Applications of Databases tenutosi a Wadern nel 2000 [10.1007/978-3-642-18690-5_8].

Logics for Authorizations and Security

P. Samarati
Ultimo
2004

Abstract

Today's computer systems and applications are based on a globally internet worked infrastructure, connecting remote parties through large-scale networks such as the World Wide Web. The network-based nature of applications improves information availability, but at the same time, it increases system vulnerability; calling for powerful and reliable tools for specifying and enforcing security properties. The expressive power and the formal foundations of logical formalisms are appealing in this context. Logics of various kinds have already been investigated and are being proposed as suitable means for tackling many facets of security. In this chapter, we survey some of the major applications of logics to the specification, verification, and enforcement of security policies, with special attention to the security issues that arise in open and distributed systems. We shall point out some practical aspects that may increase the usability of logic-based techniques and some possible directions for further research.
Distributed systems; access-control; models; authentication; knoledge; framework; computer; refusal
Settore INF/01 - Informatica
2004
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/192522
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 28
social impact