Security services in a multi-user environment are often based on access control mechanisms. Static aspects of an access control policy can be formalised using abstract algebraic models. We integrate these static aspects into a dynamic framework considering requesting access to resources as a process aiming at the prevention of access control violations when a program is executed. We use another algebraic technique, monads, as a meta-language to integrate access control operations into a functional programming language. The integration of monads and concepts from a denotational model for process algebras provides a framework for programming of access control in security systems
peer reviewedThe issue of representing access control requirements continues to demand significant a...
In this paper, we introduce EB3SEC. This language is used to express access control policies in info...
In this work we explore the use of process algebra in formal-ising and analysing access control poli...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
International audienceAccess control software must be based on a security policy model. Flaws in the...
Despite considerable advancements in the area of access control and authorization languages, current...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Access control is the process of mediating every request to data and services maintained by a system...
We present a language for access control. The language is organized around the notion of execution o...
peer reviewedThe issue of representing access control requirements continues to demand significant a...
In this paper, we introduce EB3SEC. This language is used to express access control policies in info...
In this work we explore the use of process algebra in formal-ising and analysing access control poli...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
International audienceAccess control software must be based on a security policy model. Flaws in the...
Despite considerable advancements in the area of access control and authorization languages, current...
We present a language for access control. The language is organized around the notion of execution o...
We present a language for access control. The language is organized around the notion of execution o...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Access control is the process of mediating every request to data and services maintained by a system...
We present a language for access control. The language is organized around the notion of execution o...
peer reviewedThe issue of representing access control requirements continues to demand significant a...
In this paper, we introduce EB3SEC. This language is used to express access control policies in info...
In this work we explore the use of process algebra in formal-ising and analysing access control poli...