We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control policies in XACML. These XACML policies are then translated in FACPL, a policy language with a formal semantics, and the resulting policies are evaluated by means of a Java-based software tool
Access control systems are widely used means for the protection of computing systems. They are defin...
Part 2: Web SecurityInternational audienceSecurity is a critical concern for any information system....
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
We introduce a UML-based notation for graphically modeling systems’ security aspects in a simple an...
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Languag...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Abstract—The advent of emerging technologies such as Web services, service-oriented architecture, an...
Abstract. We present a formal, tool-supported approach to the design and maintenance of access contr...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
Security requirements have become an integral part of most modern software systems. In order to prod...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Access control systems are widely used means for the protection of computing systems. They are defin...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
Access control systems are widely used means for the protection of computing systems. They are defin...
Part 2: Web SecurityInternational audienceSecurity is a critical concern for any information system....
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
We introduce a UML-based notation for graphically modeling systems’ security aspects in a simple an...
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Languag...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Abstract—The advent of emerging technologies such as Web services, service-oriented architecture, an...
Abstract. We present a formal, tool-supported approach to the design and maintenance of access contr...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
Security requirements have become an integral part of most modern software systems. In order to prod...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Access control systems are widely used means for the protection of computing systems. They are defin...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
Access control systems are widely used means for the protection of computing systems. They are defin...
Part 2: Web SecurityInternational audienceSecurity is a critical concern for any information system....
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...