Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies are difficult to express naturally in traditional policy languages. We propose a compositional formal framework for the specification and verification of temporal access control policies for security critical systems in which history-based policies and other temporal constraints can be expressed. In particular, our framework allows for the specification of policies that can change dynamically in response to time or events enabling dynamic reconfiguration of the access control mechanisms. The framework utilizes a singl...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
International audienceConstraints in access control models are used to organize access privileges in...
An extension of the $\lambda$-calculus is proposed, to study history-based access control. It all...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
As information systems evolve to cope with the ever increasing demand of today’s digital world, so d...
The paper is a deliverable for the DIF-DTC project "Secure and Trusted Agents for Information Fusion...
A new access control model incorporating the notion of time and events is introduced. It allows the ...
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
Access control models, such as the ones supported by commercial DBMSs, are not yet able to fully mee...
Abstract. We develop a modeling technique based on interpreted systems in or-der to verify temporal-...
Reputation systems are meta systems that record, aggregate and dis-tribute information about princip...
Access control policies are essential to determine who is allowed to access data in a system without...
Abstract: Establishing formal models of security policies to control and restrict the access to sens...
In this paper we present a temporal access control model that provides for decentralized administrat...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
International audienceConstraints in access control models are used to organize access privileges in...
An extension of the $\lambda$-calculus is proposed, to study history-based access control. It all...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
As information systems evolve to cope with the ever increasing demand of today’s digital world, so d...
The paper is a deliverable for the DIF-DTC project "Secure and Trusted Agents for Information Fusion...
A new access control model incorporating the notion of time and events is introduced. It allows the ...
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
Access control models, such as the ones supported by commercial DBMSs, are not yet able to fully mee...
Abstract. We develop a modeling technique based on interpreted systems in or-der to verify temporal-...
Reputation systems are meta systems that record, aggregate and dis-tribute information about princip...
Access control policies are essential to determine who is allowed to access data in a system without...
Abstract: Establishing formal models of security policies to control and restrict the access to sens...
In this paper we present a temporal access control model that provides for decentralized administrat...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
International audienceConstraints in access control models are used to organize access privileges in...
An extension of the $\lambda$-calculus is proposed, to study history-based access control. It all...