Abstract. Access-control policies have grown from simple matrices to non-trivial specifications written in sophisticated languages. The increasing complexity of these policies demands correspondingly strong automated reasoning techniques for understanding and debugging them. The need for these techniques is even more pressing given the rich and dynamic nature of the environments in which these policies evaluate. We define a framework to represent the behavior of accesscontrol policies in a dynamic environment. We then specify several interesting, decidable analyses using first-order temporal logic. Our work illustrates the subtle interplay between logical and state-based methods, particularly in the presence of three-valued policies. We als...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the process of mediating every request to data and services maintained by a system...
Abstract—As the number and sophistication of on-line ap-plications increase, there is a growing conc...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Security requirements deal with the protection of assets against unauthorized access (disclosure or...
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
International audienceConstraints in access control models are used to organize access privileges in...
Despite considerable advancements in the area of access control and authorization languages, current...
As information systems evolve to cope with the ever increasing demand of today’s digital world, so d...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Abstract. We develop a modeling technique based on interpreted systems in or-der to verify temporal-...
International audienceAccess control is a central issue among the overall security goals of informat...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the process of mediating every request to data and services maintained by a system...
Abstract—As the number and sophistication of on-line ap-plications increase, there is a growing conc...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Security requirements deal with the protection of assets against unauthorized access (disclosure or...
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
International audienceConstraints in access control models are used to organize access privileges in...
Despite considerable advancements in the area of access control and authorization languages, current...
As information systems evolve to cope with the ever increasing demand of today’s digital world, so d...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Abstract. We develop a modeling technique based on interpreted systems in or-der to verify temporal-...
International audienceAccess control is a central issue among the overall security goals of informat...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the process of mediating every request to data and services maintained by a system...
Abstract—As the number and sophistication of on-line ap-plications increase, there is a growing conc...