2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.8
|View full text |Cite
|
Sign up to set email alerts
|

DKAL: Distributed-Knowledge Authorization Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(102 citation statements)
references
References 12 publications
0
102
0
Order By: Relevance
“…In what follows we focus on one logical construct that has often been used in this context, says (e.g., [2,6,8,12,13,20,22,29,33,43,46,48,54,63]). The formula p says s represents that principal p makes statement s. This statement may simply be a request for an operation.…”
Section: Saying Predicatesmentioning
confidence: 99%
See 2 more Smart Citations
“…In what follows we focus on one logical construct that has often been used in this context, says (e.g., [2,6,8,12,13,20,22,29,33,43,46,48,54,63]). The formula p says s represents that principal p makes statement s. This statement may simply be a request for an operation.…”
Section: Saying Predicatesmentioning
confidence: 99%
“…Several of these languages rely on concepts and techniques from logic, specifically from logic programming: D1LP [48], SD3 [42], RT [50], Binder [22], Soutei [54],Sec-PAL [13], and DKAL [33]. Other languages such as SDSI [55], SPKI [23], and XrML 2.0 [62] include related ideas though typically with less generality.…”
Section: From Logics To Languagesmentioning
confidence: 99%
See 1 more Smart Citation
“…While subterfuge is concerned with how an attacker can interfere with a target's policy certificates, probing-free authorization [2,3,14] is concerned with determining what an attacker can infer about hidden policy certificates when making queries. Both subterfuge and probing are effectively concerned with determining whether information flows [15,19,21] from one principal to another as a result of using the delegation system.…”
Section: Related Workmentioning
confidence: 99%
“…The development of DKAL (Distributed-Knowledge Authorization Language) [17], another logic-based language, was based on SecPAL, and had the goal to remove a potential information leak problem and to increase expressivity by allowing the free use of functions. Apart from the use of function symbols, the main difference to SecPAL is that communication is targeted, i.e.…”
Section: Other Logic-based Authorization and Trust Policy Languagesmentioning
confidence: 99%