Mining Meets Abstract Interpretation J. Carmona and J. Cortadella Universitat Polit`ecnica de Catalunya, Spain The discovery of process models out of system traces is a problem tha...
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
Two simple but practical production systems are modeled using Petri Nets. Petri-net models are very useful in finding semantic errors like generalization error and missing conditi...
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...