We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, either on his own or on someone else’s behalf. We also provide a logical language for access control lists, and theories for deciding whether requests should be granted.
CITATION STYLE
Abadi, M., Burrows, M., Lampson, B., & Plotkin, G. (1992). A calculus for access control in distributed systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 576 LNCS). Springer Verlag. https://doi.org/10.1007/3-540-46766-1_1
Mendeley helps you to discover research relevant for your work.