Many protection mechanisms in computer security are designed to enforce a configurable policy. The security policy captures high-level goals and intentions, and is managed by a policy author tasked with translating these goals into an implementable policy. In our work, we focus on access control policies where errors in the specified policy can result in the mechanism incorrectly denying a request to access a resource, or incorrectly allowing access to a resource that they should not have access to. Due to the need for correct policies, it is critical that organizations and individuals have usable tools to manage security policies. Policy management encompasses several subtasks including specifying the initial security policy, modifying an ...
Abstract—The ever increasing popularity of Facebook and other Online Social Networks has left a weal...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the wor...
Many protection mechanisms in computer security are designed to enforce a configurable policy. The s...
Significant effort has been invested in developing expressive and flexible access-control languages ...
The protection of privacy is an increasing concern in our networked society because of the growing a...
Access control is a security measure that is employed in computer systems to protect its data from u...
The research described in this work can significantly simplify and facilitate the creation and confi...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
Facebook is one of the most important social networking sites used by over a billion of people. Face...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Access control policies describe high level requirements for access control systems. Access control ...
Abstract—The ever increasing popularity of Facebook and other Online Social Networks has left a weal...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the wor...
Many protection mechanisms in computer security are designed to enforce a configurable policy. The s...
Significant effort has been invested in developing expressive and flexible access-control languages ...
The protection of privacy is an increasing concern in our networked society because of the growing a...
Access control is a security measure that is employed in computer systems to protect its data from u...
The research described in this work can significantly simplify and facilitate the creation and confi...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
Facebook is one of the most important social networking sites used by over a billion of people. Face...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Access control policies describe high level requirements for access control systems. Access control ...
Abstract—The ever increasing popularity of Facebook and other Online Social Networks has left a weal...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the wor...