We consider the extension of fair event system specifications by concepts of access control (prohibitions, user rights, and obligations). We give proof rules for verifying that an access control policy is correctly implemented in a system, and consider preservation of access control by refinement of event systems. Prohibitions and obligations are expressed as properties of traces and are preserved by standard refinement notions of event systems. Preservation of user rights is not guaranteed by construction; we propose to combine implementation-level user rights and obligations to implement high-level user rights
Access control systems are widely used means for the protection of computing systems. They are defin...
We investigate the idea of developing access control systems in Event-B by specifying separately the...
Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have bee...
Abstract: We consider the extension of fair event system specifications by concepts of access contro...
International audienceWe consider the extension of fair event system specifications by concepts of a...
Access control is the process of mediating every request to data and services maintained by a syste...
Access control is the process of mediating every request to data and services maintained by a system...
In this paper, we introduce EB3SEC. This language is used to express access control policies in info...
Access control is the process of mediating every request to data and services maintained by a system...
Access control policies describe high level requirements for access control systems. Access control ...
A major drawback of existing access control systems is that they have all been developed with a spec...
Access control is the process of mediating every request to resources and data maintained by a syste...
Abstract. Access control is concerned with granting access to sensitive data based on conditions tha...
Obligations are an important and indispensable part of many access control policies, such as those i...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
Access control systems are widely used means for the protection of computing systems. They are defin...
We investigate the idea of developing access control systems in Event-B by specifying separately the...
Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have bee...
Abstract: We consider the extension of fair event system specifications by concepts of access contro...
International audienceWe consider the extension of fair event system specifications by concepts of a...
Access control is the process of mediating every request to data and services maintained by a syste...
Access control is the process of mediating every request to data and services maintained by a system...
In this paper, we introduce EB3SEC. This language is used to express access control policies in info...
Access control is the process of mediating every request to data and services maintained by a system...
Access control policies describe high level requirements for access control systems. Access control ...
A major drawback of existing access control systems is that they have all been developed with a spec...
Access control is the process of mediating every request to resources and data maintained by a syste...
Abstract. Access control is concerned with granting access to sensitive data based on conditions tha...
Obligations are an important and indispensable part of many access control policies, such as those i...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
Access control systems are widely used means for the protection of computing systems. They are defin...
We investigate the idea of developing access control systems in Event-B by specifying separately the...
Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have bee...