Associated research group: Critical Systems Research GroupSecurity policy is a critical property in software applications which require high levels of safety and security. It has to be clearly specified in requirement documents and its implementation must be conformed to the specification. In this paper, we propose an approach to check if the implementation is in accordance with its security policy specification. We use the Abstract Syntax Tree (AST), another manner of expressing the program, to analyze the source code and specify user permission policy in software systems by Role-Based Access Control (RBAC)
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...
Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control po...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Abstract. Role-based access control (RBAC) has been acknowledged as an effective mechanism for speci...
Abstract. Many of today’s software applications require a high-level of security, defined by a detai...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
While Role Based Access Control (RBAC) has been a popular topic of research over the last several ye...
Abstract. In this paper we present Vac, an automatic tool for ver-ifying security properties of admi...
In this paper we present Vac, an automatic tool for verifying security properties of administrative ...
Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control po...
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated secu...
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies corr...
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...
Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control po...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Abstract. Role-based access control (RBAC) has been acknowledged as an effective mechanism for speci...
Abstract. Many of today’s software applications require a high-level of security, defined by a detai...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
While Role Based Access Control (RBAC) has been a popular topic of research over the last several ye...
Abstract. In this paper we present Vac, an automatic tool for ver-ifying security properties of admi...
In this paper we present Vac, an automatic tool for verifying security properties of administrative ...
Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control po...
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated secu...
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies corr...
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...
Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control po...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...