Abstract
In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Aucher, G., Boella, G., van der Torre, L.: A dynamic logic for privacy compliance. Artif. Intell. Law 19(2-3), 187–231 (2011)
Boella, G., Gabbay, D.M., Genovese, V., van der Torre, L.: Fibred security language. Studia Logica 92(3), 395–436 (2009)
Broersen, J., van der Torre, L.: Ten problems of deontic logic and normative reasoning in computer science. In: ESSLLI 2010/2011 Lecture Notes in Logic and Computation (2012)
Cuppens, F.: A logical formalization of secrecy. In: IEEE Computer Security Foundations Workshop CSFW 1993. IEEE Computer Society, Los Alamitos (1993)
Cuppens, F., Demolombe, R.: A deontic logic for reasoning about confidentiality. In: Deontic Logic, Agency and Normative Systems, Third International Workshop on Deontic Logic in Computer Science, DEON 1996. Springer, Berlin (1996)
Cuppens, F., Demolombe, R.: A Modal Logical Framework for Security Policies. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1997. LNCS, vol. 1325, pp. 579–589. Springer, Heidelberg (1997)
Garg, D., Genovese, V., Negri, S.: Countermodels from sequent calculi in multi-modal logics. In: 27th Annual ACM/IEEE Symposium on Logics in Computer Science - LICS 2012 (2012)
Genovese, V., Garg, D., Rispoli, D.: Labeled sequent calculi for access control logics: Countermodels, saturation and abduction. In: 25th IEEE Computer Security Foundations Symposium - CSF 2012 (2012)
Genovese, V., Garg, D.: New Modalities for Access Control Logics: Permission, Control and Ratification. In: Meadows, C., Fernández-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 56–71. Springer, Heidelberg (2012)
Genovese, V., Giordano, L., Gliozzi, V., Pozzato, G.L.: A Conditional Constructive Logic for Access Control and Its Sequent Calculus. In: Brünnler, K., Metcalfe, G. (eds.) TABLEAUX 2011. LNCS, vol. 6793, pp. 164–179. Springer, Heidelberg (2011)
Hansen, J., Pigozzi, G., van der Torre, L.W.N.: Ten philosophical problems in deontic logic. In: Boella, G., van der Torre, L.W.N., Verhagen, H. (eds.) Normative Multi-agent Systems. Dagstuhl Seminar Proceedings, vol. 07122, Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany (2007)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese library, vol. 337. Springer, Berlin (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
van der Torre, L. (2012). Logics for Security and Privacy. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds) Data and Applications Security and Privacy XXVI. DBSec 2012. Lecture Notes in Computer Science, vol 7371. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31540-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-31540-4_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31539-8
Online ISBN: 978-3-642-31540-4
eBook Packages: Computer ScienceComputer Science (R0)