Sciweavers

JHSN
2006
100views more  JHSN 2006»
13 years 4 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
DSS
2007
124views more  DSS 2007»
13 years 4 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
JCS
2008
119views more  JCS 2008»
13 years 4 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
IADIS
2004
13 years 6 months ago
Web server authorisation with the policyupdater access control system
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
Vino Fernando Crescini, Yan Zhang, Weiyuan Wang
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 6 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
DBSEC
2004
91views Database» more  DBSEC 2004»
13 years 6 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 6 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...
ICWS
2010
IEEE
13 years 6 months ago
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of messa...
Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid
ACSAC
2008
IEEE
13 years 6 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
FOSAD
2000
Springer
13 years 8 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...