Access policy specification for Web applications

Research output: Chapter in Book/Report/Conference proceedingConference paper

Abstract

We show how access to Web resources may be controlled by using an access control program that implements a reactive agent. The agent reasons about the events, actions and a history (of events and actions) that relate to a user in order to make decisions about permitting the user to access information that is held on remote servers. The access control program is based on an abstract access control model that is formally specified as a clause form theory. Access policies may be efficiently implemented in a variety of practical languages.
Original languageEnglish
Title of host publicationITCC 2004. International Conference on Information Technology: Coding and Computing, 2004. Proceedings.
Place of PublicationLOS ALAMITOS
PublisherIEEE
Pages45 - 49
Number of pages5
Volume2
ISBN (Print)0-7695-2108-8
DOIs
Publication statusPublished - 2004
EventInternational Conference on Information Technology - Coding and Computing - Las vegas, NV
Duration: 1 Jan 2004 → …

Conference

ConferenceInternational Conference on Information Technology - Coding and Computing
CityLas vegas, NV
Period1/01/2004 → …

Fingerprint

Dive into the research topics of 'Access policy specification for Web applications'. Together they form a unique fingerprint.

Cite this