摘要 :
South Africa is one of the few countries in Africa that has codified a national space policy. South Africa's first public national space policy was adopted in 2009. The policy has given direction and purpose to the country's recen...
展开
South Africa is one of the few countries in Africa that has codified a national space policy. South Africa's first public national space policy was adopted in 2009. The policy has given direction and purpose to the country's recent space activities. Prior to this, space activities in South Africa were disparate and uncoordinated. Because space policy is not a primary policy issue, but rather an ancillary policy issue, the development of space policy had to be couched in terms that made it clear to policymakers exactly how space activities would contribute to national development and other policy priorities. This required building capacity in government to engage in policy discussions around these issues. We describe the process that was followed to raise the political profile of space affairs to the point that it became a policy issue for the South African government. The policy development narrative is arranged in a series of ten goals that were addressed during the policy development process. These goals speak to how one can address the political and systemic challenges of space policy formulation in the context of an emerging space nation that is also a developing country. The goals may thus be of interest to other emerging space nations at a similar stage in their development. (C) 2016 Published by Elsevier Ltd.
收起
摘要 :
Access control policies are specified within systems to ensure confidentiality of their information. Available knowledge about policies is usually incomplete and uncertain. An essential goal in reasoning is to reach conclusions wh...
展开
Access control policies are specified within systems to ensure confidentiality of their information. Available knowledge about policies is usually incomplete and uncertain. An essential goal in reasoning is to reach conclusions which can be justified. However, since justification does not necessarily guarantee truth, the best we can do is to derive "plausible/ tentative" conclusions from partial and conflicting information. Policies are typically expressed as rules that could be complex and include timing constraints. Complex sets of access policies can contain conflicts e.g., a rule allows access while another rule prevents it. In this paper, we aim at providing a formalism for specifying authorization policies of a dynamic system. We present a temporal defeasible logic (TDL) which allows us to specify temporal policies and to handle conflicts. It can be shown that the proposed model is a generalization of the role-based access control model.
收起
摘要 :
In [2, 3], we proposed a model-based approach to specify the transformation of authorizations based on the principle of minimal change [10] and its application in database systems. Nevertheless, there were some limitations in this...
展开
In [2, 3], we proposed a model-based approach to specify the transformation of authorizations based on the principle of minimal change [10] and its application in database systems. Nevertheless, there were some limitations in this approach. Firstly, we could not represent a sequence of transformations. Secondly, default authorizations could not be expressed. In this paper, we propose two high-level formal languages, L_s and L_(sd), to specify a sequence of authorization transformations and default authorizations. Our work starts with L_s, a simple, but expressive, language to specify certain sequence of authorization transformations. Furthermore, L_(sd) has more powerful expressiveness than L_s in the sense that constraints, causal and inherited authorizations, and general default authorizations can be specified.
收起
摘要 :
We present the design, proof theory and metatheory of a logic for representing and reasoning about authorization policies. A salient feature of the logic, BL, is its support for system state in the form of interpreted predicates, ...
展开
We present the design, proof theory and metatheory of a logic for representing and reasoning about authorization policies. A salient feature of the logic, BL, is its support for system state in the form of interpreted predicates, upon which authorization policies often rely. In addition, BL includes Abadi et al.'s "says" connective and explicit time. BL is illustrated through a case study of policies for sharing sensitive information created in the US intelligence community. We discuss design choices in the interaction between state and other features of BL and validate BL's proof theory by proving standard metatheoretic properties like admissibility of cut.
收起
摘要 :
Abstract How is policy change possible if policy entrepreneurs’ cognition, rationality and identity are conditioned by the very policy institutions they wish to change? To solve this paradox of embedded agency, we must avoid eith...
展开
Abstract How is policy change possible if policy entrepreneurs’ cognition, rationality and identity are conditioned by the very policy institutions they wish to change? To solve this paradox of embedded agency, we must avoid either voluntarism that inflates the role of actors to change policies as by existing policy entrepreneurship applications, or determinism whereby policy changes are decided by contextual forces. Instead, drawing on institutional theory, critical realism sees structures, institutions, and actions that constitute policy dynamics as existing in separate yet intertwined reality domains: structures (e.g., social relationships), and institutions (e.g., formal rules and norms such as institutional logics) in the Real domain, enable and constrain policy actors’ navigation of their social environments; the Actual domain represents the level at which events (actions) happen, as these actors constantly interpret varied institutions to adjust their structurally embedded actions when pursuing policy changes that can be observed in the Empirical domain. Put differently, structures and institutions are mechanisms in the Real domain that affect individual practices and events in the Actual domain, and only some of these events are realized in the Empirical domain as policy changes. We empirically illustrate this critical realist approach with a Chinese example on health care reform.
收起
摘要 :
Administering and maintaining access control systems is a challenging task, especially in environments with complex and changing authorization requirements. A number of authorization logics have been proposed that aim at simplifyi...
展开
Administering and maintaining access control systems is a challenging task, especially in environments with complex and changing authorization requirements. A number of authorization logics have been proposed that aim at simplifying access control by factoring the authorization policy out of the hard-coded resource guard. However, many policies require the authorization state to be updated after a granted access request, for example, to reflect the fact that a user has activated or deactivated a role. Current authorization languages cannot express such state modifications; these still have to be hard-coded into the resource guard. We present a logic for specifying policies where access requests can have effects on the authorization state. The logic is semantically defined by a mapping to Transaction Logic. Using this approach, updates to the state are factored out of the resource guard, thus enhancing maintainability and facilitating more expressive policies that take the history of access requests into account. We also present a sound and complete proof system for reasoning about sequences of access requests. This gives rise to a goal-oriented algorithm for finding minimal sequences that lead to a specified target authorization state.
收起
摘要 :
Goals and policies are presented as special kinds of rules for managing systems in a flexible way without requiring specialised technical knowledge. However, it is not always possible to rely on exact information for such an appro...
展开
Goals and policies are presented as special kinds of rules for managing systems in a flexible way without requiring specialised technical knowledge. However, it is not always possible to rely on exact information for such an approach. Policies should therefore not have to be formulated in terms of precise inputs and outputs. Instead, it is desirable to allow loose goals and policies that accommodate probabilistic system inputs/outputs and fuzziness in rules. This is a general solution that is relevant to many different kinds of applications. The paper uses automated home care management as a concrete illustration of how the approach works. The overall system architecture is presented, along with an overview of the language for expressing goals and policies. The extensions made to allow looser formulations are described. An extended worked example explains various aspects of the approach. The paper concludes with a user evaluation and a discussion of the work.
收起
摘要 :
Equity is frequently cited as one of the key design aspects of environmental governance regimes. In the context of Reduced Emissions from Deforestation and Forest Degradation (REDD+), a forest-based climate change mitigation instr...
展开
Equity is frequently cited as one of the key design aspects of environmental governance regimes. In the context of Reduced Emissions from Deforestation and Forest Degradation (REDD+), a forest-based climate change mitigation instrument, the manner in which equity' is understood will be of critical importance for the impacts and acceptance of REDD+policies and initiatives. Whereas the concept has been extensively studied in the academic literature, references to equity in REDD+policy debates and documents are often vague, leaving room for various interpretations and modes of implementation. In our case study of the Tanzanian national REDD+policy domain, we provide a conceptual framework based on an institutional logics approach for analysing the various underlying rationalities in the equity in REDD+' debate. We apply it to demonstrate how the involved policy actors draw from heterogeneous equity logics in their support for and opposition to different governance models, highlighting the importance of precise contextualization and operationalization of broad international principles in national REDD+initiatives. Copyright (c) 2015 John Wiley & Sons, Ltd and ERP Environment.
收起
摘要 :
A deontic STIT logic is studied in this paper with the possible application of specifying security policies for intrude detection in the pervasive computing environment. Compared to the existing deontic STIT logics, an advantage o...
展开
A deontic STIT logic is studied in this paper with the possible application of specifying security policies for intrude detection in the pervasive computing environment. Compared to the existing deontic STIT logics, an advantage of our logic is that it is capable of solving the miners paradox, a logical paradox which recently grabs attentions of logicians, philosophers, linguistists and computer scientists. A complete and sound axiomatization of our logic is developed.
收起
摘要 :
A fundamental problem in the specification of regulatory privacy policies such as the Health Insurance Portability and Accountability Act (HIPAA) in a computer system is to state the policies precisely, consistent with their high-...
展开
A fundamental problem in the specification of regulatory privacy policies such as the Health Insurance Portability and Accountability Act (HIPAA) in a computer system is to state the policies precisely, consistent with their high-level intuition. In this paper, we propose UML sequence diagrams as a practical means to graphically express privacy policies. A graphical representation allows decision-makers such as application domain experts and security architects to easily verify and confirm the expected behavior. Once intuitively confirmed, our work in this article introduces an algorithmic approach to formalizing the semantics of sequence diagrams in terms of linear temporal logic (LTL) templates. In all the templates, different semantic aspects are expressed as separate, yet simple LTL formulas that can be composed to define the complex semantics of sequence diagrams. The formalization enables us to leverage the analytical powers of automated decision procedures for LTL formulas to determine if a collection of sequence diagrams is consistent, independent, etc. and also to verify if a system design conforms to the privacy policies. We evaluate our approach by modeling and analyzing a substantial subset of HIPAA rules using sequence diagrams.
收起