Sciweavers

837 search results - page 13 / 168
» Rewriting-Based Access Control Policies
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
ICFEM
2007
Springer
14 years 1 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
SP
2010
IEEE
149views Security Privacy» more  SP 2010»
13 years 11 months ago
On the Incoherencies in Web Browser Access Control Policies
—Web browsers’ access control policies have evolved
Kapil Singh, Alexander Moshchuk, Helen J. Wang, We...
CCS
2009
ACM
14 years 8 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CBMS
2006
IEEE
14 years 1 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...