Abductive Authorization Credential Gathering.
Moritz Y. BeckerJason F. MackayBlair DillawayPublished in: POLICY (2009)
Keyphrases
- access control
- trust negotiation
- security policies
- automated trust negotiation
- fine grained
- access control policies
- abductive reasoning
- logic programming
- dynamic access control
- data security
- information gathering
- trust management
- security requirements
- background knowledge
- plan recognition
- abductive logic programming
- gathering information
- access control mechanism
- security mechanisms
- explanation based learning
- constraint logic programming
- identity management
- role based access control
- logic programs
- belief updating
- probabilistic logic
- security analysis
- data mining
- management system