Sciweavers

124 search results - page 8 / 25
» Synthesising verified access control systems in XACML
Sort
View
DSS
2000
107views more  DSS 2000»
14 years 9 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
15 years 10 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
ESCIENCE
2006
IEEE
15 years 4 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...
CSFW
2012
IEEE
13 years 12 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CORR
2006
Springer
113views Education» more  CORR 2006»
14 years 10 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz