Security Policies in Constraint Handling Rules
Author: Thom Fruehwirth
Paper Information
Title: | Security Policies in Constraint Handling Rules |
Authors: | Thom Fruehwirth |
Proceedings: | LPOP Position Papers |
Editors: | K. Tuncay Tekle and Marc Denecker |
Keywords: | Role-Based Access Control (RBAC), Constraint Handling Rules (CHR), Security Policy, Trust Management, UML, Object Constraint Language (OCL), Datalog |
Abstract: | ABSTRACT. Role-Based Access Control (RBAC) is a popular security policy framework. User access to resources is controlled by roles and privileges. Constraint Handling Rules (CHR) is a rule-based constraint logic language. CHR has been used to implement security policies for trust management systems like RBAC for more than two decades. In this extended abstract, we give some references to these works. |
Pages: | 3 |
Talk: | Jul 18 11:10 (Session 126E: Security Policies as Challenge Problems) |
Paper: |