Sciweavers

872 search results - page 20 / 175
» An Access Control Language for a General Provenance Model
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
ESOP
2003
Springer
14 years 22 days ago
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers
In complex systems, like robot plants, applications are built on top of a set of components, or devices. Each of them has particular individual constraints, and there are also log...
Karine Altisen, Aurélie Clodic, Florence Ma...
CCS
2008
ACM
13 years 9 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
ACSAC
2001
IEEE
13 years 11 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
ICSE
2007
IEEE-ACM
14 years 7 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin