One vision of a context-aware pervasive networking environment promises the user a seamless access to surrounding services using her personal mobile device. This requires that the...
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...