Sciweavers

706 search results - page 14 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
ISW
2005
Springer
14 years 1 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
WWW
2007
ACM
14 years 8 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
CCS
2009
ACM
14 years 8 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
ICST
2008
IEEE
14 years 1 months ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...