Abstract: "Miró is a set of languages and tools that support visual specification of file system security. We describe two visual languages: the instance language which allows specification of file system access, and the constraint language which allows specification of security policies. We present the syntax and semantics of these languages, and discuss some novel algorithms that efficiently check for properties, e.g., ambiguity, of instance pictures. We also describe the implementation of our tools and give examples of how the languages can be applied to real security specification problems.
This paper contrasts stereotypes as a type of extensibility mechanism of the UML meta-language with ...
This dissertation is about the implementation and integration of the interactive markup language to ...
Abstract-Enterprise security management requires capturing different security and IT systems ’ detai...
Abstract: "The Miró visual language [HMT90] allow a user to specify the security configuration of ...
We describe a system called Miro for specifying and checking security constraints. Our system is gen...
The management of distributed multimedia systems is simplified when it is based on policies. The lat...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
Abstract. In this paper we show how we can increase the ease of reading and writing security require...
Abstract. In this paper we show how we can increase the ease of reading and writing security require...
We introduce a formal specification language locks, that allow security practitioners to express as ...
International audienceDesigning a security policy for an information system is a non-trivial task. I...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and develo...
This paper contrasts stereotypes as a type of extensibility mechanism of the UML meta-language with ...
This dissertation is about the implementation and integration of the interactive markup language to ...
Abstract-Enterprise security management requires capturing different security and IT systems ’ detai...
Abstract: "The Miró visual language [HMT90] allow a user to specify the security configuration of ...
We describe a system called Miro for specifying and checking security constraints. Our system is gen...
The management of distributed multimedia systems is simplified when it is based on policies. The lat...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
Abstract. In this paper we show how we can increase the ease of reading and writing security require...
Abstract. In this paper we show how we can increase the ease of reading and writing security require...
We introduce a formal specification language locks, that allow security practitioners to express as ...
International audienceDesigning a security policy for an information system is a non-trivial task. I...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and develo...
This paper contrasts stereotypes as a type of extensibility mechanism of the UML meta-language with ...
This dissertation is about the implementation and integration of the interactive markup language to ...
Abstract-Enterprise security management requires capturing different security and IT systems ’ detai...