Anonymous credentials on a standard Java card
Patrik Bichsel, Jan Camenisch, et al.
CCS 2009
In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of 'global-as-view' database schema mappings, or to extensions thereof. We illustrate our ideas with an example. Copyright 2009 ACM.
Patrik Bichsel, Jan Camenisch, et al.
CCS 2009
Qiang Zeng, Mingyi Zhao, et al.
IEEE TKDE
Ian Molloy, Ninghui Li, et al.
SACMAT 2009
Ian Molloy, Hong Chen, et al.
ACM TISSEC