Computer Science and Engineering, Department of
Computer Science, Computer Engineering, and Bioinformatics: Dissertations, Theses, and Student Research
First Advisor
Peter Z. Revesz
Date of this Version
12-2003
Document Type
Thesis
Abstract
Constraint Datalog holds an increasing role in Trust Management. We discuss several Trust Management systems and give a description of the environment and requirements for Trust Management. Constraint Datalog using addition constraints and approximation theory provides an expressive semantic with which to describe security policies for credentials, delegations and authorizations. Approximation theory allows halting in Constraint Datalog over addition constraints. We use the decision problem of Diophantine equations to show that Constraint Datalog over addition constraints is complete. Combining these two concepts provides an approximately complete, safe language. The problem of constant additions to closed languages provides reasons for using an approximately complete, safe language for Trust Management. Semantics for the Role-based Trust Management framework (RT) are given in Constraint Datalog over addition constraints including an alternate form of a threshold policy.
Advisor: Peter Z. Revesz
Comments
A thesis presented to the faculty of the Graduate College at the University of Nebraska in partial fulfillment of requirements for the degree of Master of Science
Major: Computer Science
Under the supervision of Professor Peter Z. Revesz. Lincoln, Nebraska :December 2003
Copyright 2003 Scot Anderson