Skip to main content

Logics for Security and Privacy

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNISA,volume 7371)


In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.


  • Privacy Policy
  • Normative Reasoning
  • Kripke Model
  • Access Control Policy
  • Sequent Calculus

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Aucher, G., Boella, G., van der Torre, L.: A dynamic logic for privacy compliance. Artif. Intell. Law 19(2-3), 187–231 (2011)

    CrossRef  Google Scholar 

  2. Boella, G., Gabbay, D.M., Genovese, V., van der Torre, L.: Fibred security language. Studia Logica 92(3), 395–436 (2009)

    MathSciNet  CrossRef  MATH  Google Scholar 

  3. Broersen, J., van der Torre, L.: Ten problems of deontic logic and normative reasoning in computer science. In: ESSLLI 2010/2011 Lecture Notes in Logic and Computation (2012)

    Google Scholar 

  4. Cuppens, F.: A logical formalization of secrecy. In: IEEE Computer Security Foundations Workshop CSFW 1993. IEEE Computer Society, Los Alamitos (1993)

    Google Scholar 

  5. Cuppens, F., Demolombe, R.: A deontic logic for reasoning about confidentiality. In: Deontic Logic, Agency and Normative Systems, Third International Workshop on Deontic Logic in Computer Science, DEON 1996. Springer, Berlin (1996)

    Google Scholar 

  6. Cuppens, F., Demolombe, R.: A Modal Logical Framework for Security Policies. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1997. LNCS, vol. 1325, pp. 579–589. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  7. Garg, D., Genovese, V., Negri, S.: Countermodels from sequent calculi in multi-modal logics. In: 27th Annual ACM/IEEE Symposium on Logics in Computer Science - LICS 2012 (2012)

    Google Scholar 

  8. Genovese, V., Garg, D., Rispoli, D.: Labeled sequent calculi for access control logics: Countermodels, saturation and abduction. In: 25th IEEE Computer Security Foundations Symposium - CSF 2012 (2012)

    Google Scholar 

  9. Genovese, V., Garg, D.: New Modalities for Access Control Logics: Permission, Control and Ratification. In: Meadows, C., Fernández-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 56–71. Springer, Heidelberg (2012)

    CrossRef  Google Scholar 

  10. Genovese, V., Giordano, L., Gliozzi, V., Pozzato, G.L.: A Conditional Constructive Logic for Access Control and Its Sequent Calculus. In: Brünnler, K., Metcalfe, G. (eds.) TABLEAUX 2011. LNCS, vol. 6793, pp. 164–179. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  11. Hansen, J., Pigozzi, G., van der Torre, L.W.N.: Ten philosophical problems in deontic logic. In: Boella, G., van der Torre, L.W.N., Verhagen, H. (eds.) Normative Multi-agent Systems. Dagstuhl Seminar Proceedings, vol. 07122, Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany (2007)

    Google Scholar 

  12. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    MathSciNet  CrossRef  MATH  Google Scholar 

  13. van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese library, vol. 337. Springer, Berlin (2007)

    CrossRef  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

van der Torre, L. (2012). Logics for Security and Privacy. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds) Data and Applications Security and Privacy XXVI. DBSec 2012. Lecture Notes in Computer Science, vol 7371. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31539-8

  • Online ISBN: 978-3-642-31540-4

  • eBook Packages: Computer ScienceComputer Science (R0)