Skip to main content

Evaluating Role Based Authorization Programs

  • Conference paper
Foundations of Intelligent Systems (ISMIS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7661))

Included in the following conference series:

  • 1291 Accesses

Abstract

In this paper, we discuss a role based authorization program and its implementation. A role based authorization program (RBAP) is a logic based framework which enables users to describe complex access control policies in a decentralized system. It supports administrative privilege delegations for both roles and access rights. The program Smodels is a widely used system that implements the answer set semantics for extended logic programs. In this paper, we show how to use Smodels to evaluate RBAP. The access control policy is also given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Generation Computing 9, 365–385 (1991)

    Article  Google Scholar 

  2. Gurevich, Y., Neeman, I.: DKAL: Distributed Knowledge Authorization Language. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, pp. 149–162. IEEE Computer Society (2008)

    Google Scholar 

  3. Ruan, C., Varadharajan, V.: Reasoning about Dynamic Delegation in Role Based Access Control Systems. In: Yu, J.X., Kim, M.H., Unland, R. (eds.) DASFAA 2011, Part I. LNCS, vol. 6587, pp. 239–253. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruan, C. (2012). Evaluating Role Based Authorization Programs. In: Chen, L., Felfernig, A., Liu, J., RaÅ›, Z.W. (eds) Foundations of Intelligent Systems. ISMIS 2012. Lecture Notes in Computer Science(), vol 7661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34624-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34624-8_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34623-1

  • Online ISBN: 978-3-642-34624-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics