Sciweavers

144 search results - page 10 / 29
» Modeling conversation policies using permissions and obligat...
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
111
Voted
APSEC
2009
IEEE
14 years 9 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
76
Voted
APCCM
2006
15 years 1 months ago
Process modelling: the deontic way
Current enterprise systems rely heavily on the modelling and enactment of business processes. One of the key criteria for a business process is to represent not just the behaviour...
Vineet Padmanabhan, Guido Governatori, Shazia Wasi...
CCS
2008
ACM
15 years 1 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
IFM
2010
Springer
142views Formal Methods» more  IFM 2010»
14 years 10 months ago
An Event-B Approach to Data Sharing Agreements
A Data Sharing Agreement (DSA) is a contract among two or more principals regulating how they share data. Agreements are usually represented as a set of clauses expressed using the...
Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, ...