We analyze the safety question for the Non-Monotonic Transform (NMT) model, an access control model that encompasses a wide variety of practical access control mechanisms. In general, safety analysis, i.e whether it is possible for a specified subject to obtain a given access right for a certain object, is computationally intractable, even for many monotonic models. We identify one-representable NMT schemes and argue that they have tractable safety analysis. Safety analysis of one-representable schemes considers exactly one representative of each type of subject in the initial state, and thus the complexity of safety analysis is independent of the total number of subjects in the system. We demonstrate by example that one-representable schem...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
The Transform access-control model is based on the concept of transformation of access rights. It ha...
We present a formal system that models programmable abstractions for access control. Composite abstr...
Abstract. We present a formal system that models programmable abstractions for access control. Compo...
Models of Access Control Policies specified with graphs and graph transformation rules combine an i...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Abstract. We propose a new formalism for reasoning about dynamic memory heaps, using monotonic abstr...
International audienceSafety control consists in maintaining the state of a given system inside a sp...
Controller synthesis for nonlinear systems is considered with the following ob-jective: no trajector...
Controller synthesis for nonlinear systems is considered with the following objective: No trajectory...
Abstract. Of special interest in formal verification are safety properties, which assert that the sy...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
AbstractWe present a tutorial on verification of safety properties for parameterized systems. Such a...
This paper studies a standard screening problem where the principal’s allocation rule is multi-dimen...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
The Transform access-control model is based on the concept of transformation of access rights. It ha...
We present a formal system that models programmable abstractions for access control. Composite abstr...
Abstract. We present a formal system that models programmable abstractions for access control. Compo...
Models of Access Control Policies specified with graphs and graph transformation rules combine an i...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Abstract. We propose a new formalism for reasoning about dynamic memory heaps, using monotonic abstr...
International audienceSafety control consists in maintaining the state of a given system inside a sp...
Controller synthesis for nonlinear systems is considered with the following ob-jective: no trajector...
Controller synthesis for nonlinear systems is considered with the following objective: No trajectory...
Abstract. Of special interest in formal verification are safety properties, which assert that the sy...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
AbstractWe present a tutorial on verification of safety properties for parameterized systems. Such a...
This paper studies a standard screening problem where the principal’s allocation rule is multi-dimen...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
Abstract. Monotonicity in concurrent systems stipulates that, in any global state, extant system act...
The Transform access-control model is based on the concept of transformation of access rights. It ha...