Computer Science ›› 2016, Vol. 43 ›› Issue (10): 177-181.doi: 10.11896/j.issn.1002-137X.2016.10.033

Previous Articles     Next Articles

Optional Transaction Logic with Weighted Predicates and its Application in Access Control

MA Li, HUO Yin-yu, ZHONG Yong and QIN Xiao-lin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Due to the expressiveness and flexibility,logic languages have become one of the bases of authorization language in access control.Concerned on the ability to express transaction and multi-party decision model,this paper extended Datalog language to WT-Logic,which is a kind of optional transaction logic with weighted predicates.Firstly,the syntax and semantics of the logic are discussed.Secondly,the evaluation method of the logic is explained.Lastly,the application of WT-logic in workflow authorization and multi-party voting mechanism is described and exampled,which shows the expressiveness and application of the logic.

Key words: Optional transaction logic,Weighted predicates,WT-Logic,Datalog,Authorization language

[1] Vera Z M,Julia S,Serge A,et al.Collaborative Access Control in WebdamLog[C]∥Proceeding of the ACM Sigmod Conference on Data Management,2015.Melbourne,Australia,2015:197-211
[2] Liu X,Alechina N,Logan B.Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control[C]∥International Conference on Information Security Practice and Experience.2013:233-247
[3] Galland A.Distributed data management with access control:social Networks and Data of the Web[J].Nature Communications,2011,5:4864
[4] Zhong Yong,Qin Xiao-lin,Liu Feng-yu.Obligation Authoriza-tion Model and Its Implementation Frame-work for DRM[J].Journal of Software,2010,1(8):2059-2069(in Chinese) 钟勇,秦小麟,刘凤玉.一种面向DRM的责任授权模型及其实施框架,软件学报,2010,21(8):2059-2069
[5] Zhong Yong,Zhang Hong,Liu Feng-yu,et al.A Digital Rights Management Mechanism and Implementation Based on Logic Framework[J].Journal of Computer Research and Development,2010,47(2):223-230(in Chinese) 钟勇,张宏,刘凤玉,等.一种基于逻辑框架的数字版权管理机制和实现[J].计算机研究与发展,2010,47(2):223-230
[6] Hu H,Ahn G J,Jorgensen J.Multiparty Access Control for Online Social Networks:Model and Mechanisms[J].IEEE Tran-sactions on Knowledge and Data Engineering,2013,5(7):1614-1627
[7] Amrutha P,Sathiyaraj R.Privacy Management of Multi UserEnvironment in Online Social Networks (OSNs)[J].GJCST-E:Network,Web & Security,2013,13(10)
[8] Basseda R,Kifer M.Planning with Regression Analysis inTransaction Logic.Web Reasoning and Rule Systems[M].Springer International Publishing,2015:45-60
[9] Basseda R,Kifer M.State Space Planning Using TransactionLogic[M].Practical Aspects of Declarative Languages,Springer International Publishing,2015:17-33
[10] Montesi D,Bertino E,Martelli M.Transactions and updates in deductive databases[J].IEEE Trans.Knowl.Data Eng.,1997,9(5):784-797
[11] Bertino E,Catania B,Gori R.Active-U-Datalog:integrating active rules in a logical update language[C]∥Proc.of Internatio-nal Seminar on Logic Databases and the Meaning of Change,Schloss Dagstuhl.Germany,1998:107-133
[12] Tom J A,Bas K,Frank N,et al.Datalog Queries Distributing over Components[C]∥Proc.of 18th International Conference on Database Theory (ICDT 2015).Dagstuhl,Germany,2015:308-323
[13] Radhakrishnan D.Dynamics of Belief:Horn Knowledge Baseand Database Updates[C]∥Proc.of 38th Annual German Conference on AI(KI 2015),LNCS 9324.Dresden,Germany,2015:341-348

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!