FLOC 2018: FEDERATED LOGIC CONFERENCE 2018
Security Policies in Constraint Handling Rules

Author: Thom Fruehwirth

Paper Information

Title:Security Policies in Constraint Handling Rules
Authors:Thom Fruehwirth
Proceedings:LPOP Position Papers
Editors: K. Tuncay Tekle and Marc Denecker
Keywords:Role-Based Access Control (RBAC), Constraint Handling Rules (CHR), Security Policy, Trust Management, UML, Object Constraint Language (OCL), Datalog
Abstract:

ABSTRACT. Role-Based Access Control (RBAC) is a popular security policy framework. User access to resources is controlled by roles and privileges. Constraint Handling Rules (CHR) is a rule-based constraint logic language. CHR has been used to implement security policies for trust management systems like RBAC for more than two decades. In this extended abstract, we give some references to these works.

Pages:3
Talk:Jul 18 11:10 (Session 126E: Security Policies as Challenge Problems)
Paper: