An extension of the $\lambda$-calculus is proposed, to study history-based access control. It allows for security policies with a possibly nested, local scope. We define a type and effect system that, given a program, extracts a history expression, i.e.\ a correct approximation to the set of histories obtainable at run-time. Validity of history expressions is non-regular, because the scope of policies can be nested. Nevertheless, a transformation of history expressions is presented, that makes verification possible through standard model checking techniques. A program will never fail at run-time if its history expression, extracted at compile-time, is valid
We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies i...
We present a language for access control. The language is organized around the notion of execution o...
Abstract. Modular verification of the functional behaviour of a con-current program remains a challe...
An extension of the $\lambda$-calculus is proposed, to study history-based access control. It all...
An extension of the lambda-calculus is proposed, to study resource usage analysis and verification...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Security requirements deal with the protection of assets against unauthorized access (disclosure or...
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisf...
AbstractWe propose a general method for the treatment of history-dependent runtime errors. When one ...
We extend permission-based separation logic with a history-based mechanism to simplify the verificat...
We extend permission-based separation logic with a history-based mechanism to simplify the verificat...
Abstract. This paper shows how type effect systems can be combined with model-checking techniques to...
Reputation systems are meta systems that record, aggregate and dis-tribute information about princip...
Tracematches are a programming language for runtime mon-itoring of Java programs. A tracematch decla...
This paper compares the expressive power of five language-based access control models. We show that ...
We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies i...
We present a language for access control. The language is organized around the notion of execution o...
Abstract. Modular verification of the functional behaviour of a con-current program remains a challe...
An extension of the $\lambda$-calculus is proposed, to study history-based access control. It all...
An extension of the lambda-calculus is proposed, to study resource usage analysis and verification...
Security requirements deal with the protection of assets against unauthorized access (disclosure or ...
Security requirements deal with the protection of assets against unauthorized access (disclosure or...
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisf...
AbstractWe propose a general method for the treatment of history-dependent runtime errors. When one ...
We extend permission-based separation logic with a history-based mechanism to simplify the verificat...
We extend permission-based separation logic with a history-based mechanism to simplify the verificat...
Abstract. This paper shows how type effect systems can be combined with model-checking techniques to...
Reputation systems are meta systems that record, aggregate and dis-tribute information about princip...
Tracematches are a programming language for runtime mon-itoring of Java programs. A tracematch decla...
This paper compares the expressive power of five language-based access control models. We show that ...
We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies i...
We present a language for access control. The language is organized around the notion of execution o...
Abstract. Modular verification of the functional behaviour of a con-current program remains a challe...