Sciweavers

294 search results - page 8 / 59
» Analyzing Consistency of Security Policies
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter
BPSC
2009
184views Business» more  BPSC 2009»
14 years 10 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
ESORICS
2005
Springer
15 years 3 months ago
Enforcing Non-safety Security Policies with Program Monitors
We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target a...
Jay Ligatti, Lujo Bauer, David Walker
71
Voted
SGAI
2007
Springer
15 years 3 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
68
Voted
ITRUST
2005
Springer
15 years 3 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...