Sciweavers

124 search results - page 1 / 25
» Synthesising verified access control systems in XACML
Sort
View
CCS
2004
ACM
13 years 8 months ago
Synthesising verified access control systems in XACML
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
JCS
2008
119views more  JCS 2008»
13 years 4 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
STTT
2008
134views more  STTT 2008»
13 years 4 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
SACMAT
2009
ACM
13 years 11 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
COMPSAC
2007
IEEE
13 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie