Sciweavers

124 search results - page 4 / 25
» Synthesising verified access control systems in XACML
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
IEEEARES
2006
IEEE
15 years 4 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
SACMAT
2009
ACM
15 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
LFCS
2007
Springer
15 years 4 months ago
A Temporal Dynamic Logic for Verifying Hybrid System Invariants
We combine first-order dynamic logic for reasoning about possible behaviour of hybrid systems with temporal logic for reasoning about the temporal behaviour during their operation...
André Platzer
SACMAT
2006
ACM
15 years 3 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi