Abstract
What I am going to talk about is power and permission in security systems. This is work by me and my supervisor, Marek Sergot from Imperial College.
In the area of security we usually use words such as right, privilege, and authorisation, but there are several interpretations of these words. Sometimes by authorisation we mean some kind of institutional power, and sometimes we mean permission. These ideas are not new. David Makinson discussed this distinction in a paper, that there is a distinction between being permitted to create a fact, and being empowered or having a legal capacity to create a fact.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Firozabadi, B.S. (2000). Power and Permission in Computer Systems. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_7
Download citation
DOI: https://doi.org/10.1007/10720107_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive