Sciweavers

591 search results - page 15 / 119
» Embracing policy engineering
Sort
View
ISSRE
2007
IEEE
14 years 11 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry
ASM
2005
ASM
15 years 3 months ago
CoreASM: An Extensible ASM Execution Engine
In this paper we introduce a new research effort in making state machines executable. The aim is to specify and implement an execution engine for a language that is as close as po...
Roozbeh Farahbod, Vincenzo Gervasi, Uwe Gläss...
FASE
2004
Springer
15 years 3 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
POLICY
2004
Springer
15 years 3 months ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
POLICY
2004
Springer
15 years 3 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell