Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2012: Data and Applications Security and Privacy XXVI pp 1–7Cite as

  1. Home
  2. Data and Applications Security and Privacy XXVI
  3. Conference paper
Logics for Security and Privacy

Logics for Security and Privacy

  • Leendert van der Torre17 
  • Conference paper
  • 2005 Accesses

  • 2 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 7371)

Abstract

In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.

Keywords

  • Privacy Policy
  • Normative Reasoning
  • Kripke Model
  • Access Control Policy
  • Sequent Calculus

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Aucher, G., Boella, G., van der Torre, L.: A dynamic logic for privacy compliance. Artif. Intell. Law 19(2-3), 187–231 (2011)

    CrossRef  Google Scholar 

  2. Boella, G., Gabbay, D.M., Genovese, V., van der Torre, L.: Fibred security language. Studia Logica 92(3), 395–436 (2009)

    CrossRef  MathSciNet  MATH  Google Scholar 

  3. Broersen, J., van der Torre, L.: Ten problems of deontic logic and normative reasoning in computer science. In: ESSLLI 2010/2011 Lecture Notes in Logic and Computation (2012)

    Google Scholar 

  4. Cuppens, F.: A logical formalization of secrecy. In: IEEE Computer Security Foundations Workshop CSFW 1993. IEEE Computer Society, Los Alamitos (1993)

    Google Scholar 

  5. Cuppens, F., Demolombe, R.: A deontic logic for reasoning about confidentiality. In: Deontic Logic, Agency and Normative Systems, Third International Workshop on Deontic Logic in Computer Science, DEON 1996. Springer, Berlin (1996)

    Google Scholar 

  6. Cuppens, F., Demolombe, R.: A Modal Logical Framework for Security Policies. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1997. LNCS, vol. 1325, pp. 579–589. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  7. Garg, D., Genovese, V., Negri, S.: Countermodels from sequent calculi in multi-modal logics. In: 27th Annual ACM/IEEE Symposium on Logics in Computer Science - LICS 2012 (2012)

    Google Scholar 

  8. Genovese, V., Garg, D., Rispoli, D.: Labeled sequent calculi for access control logics: Countermodels, saturation and abduction. In: 25th IEEE Computer Security Foundations Symposium - CSF 2012 (2012)

    Google Scholar 

  9. Genovese, V., Garg, D.: New Modalities for Access Control Logics: Permission, Control and Ratification. In: Meadows, C., Fernández-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 56–71. Springer, Heidelberg (2012)

    CrossRef  Google Scholar 

  10. Genovese, V., Giordano, L., Gliozzi, V., Pozzato, G.L.: A Conditional Constructive Logic for Access Control and Its Sequent Calculus. In: Brünnler, K., Metcalfe, G. (eds.) TABLEAUX 2011. LNCS, vol. 6793, pp. 164–179. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  11. Hansen, J., Pigozzi, G., van der Torre, L.W.N.: Ten philosophical problems in deontic logic. In: Boella, G., van der Torre, L.W.N., Verhagen, H. (eds.) Normative Multi-agent Systems. Dagstuhl Seminar Proceedings, vol. 07122, Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany (2007)

    Google Scholar 

  12. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    CrossRef  MathSciNet  MATH  Google Scholar 

  13. van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese library, vol. 337. Springer, Berlin (2007)

    CrossRef  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Computer Science and Communication, University of Luxembourg, Luxembourg

    Leendert van der Torre

Authors
  1. Leendert van der Torre
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Télécom Bretagne, Campus de Rennes 2, rue de la Châtaigneraie, 35512, Cesson Sévigné Cedex, France

    Nora Cuppens-Boulahia, Frédéric Cuppens & Joaquin Garcia-Alfaro,  & 

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

van der Torre, L. (2012). Logics for Security and Privacy. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds) Data and Applications Security and Privacy XXVI. DBSec 2012. Lecture Notes in Computer Science, vol 7371. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31540-4_1

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-31540-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31539-8

  • Online ISBN: 978-3-642-31540-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature