Sciweavers

5252 search results - page 13 / 1051
» Logic in Access Control
Sort
View
CCS
2010
ACM
13 years 5 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 4 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
MCETECH
2009
Springer
14 years 4 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin
CADE
2011
Springer
12 years 10 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
TIME
2005
IEEE
14 years 4 months ago
A Trace Semantics for Positive Core XPath
— We provide a novel trace semantics for positive core XPath that exposes all intermediate nodes visited by the query engine. This enables a detailed analysis of all information ...
Pieter H. Hartel