We describe a uniform logical framework, based on a bunched logic that combines classical additives and very weak multiplicatives, for reasoning compositionally about access control policy models. We show how our approach takes account of the underlying system architecture, and so provides a way to identify and reason about how vulnerabilities may arise (and be removed) as a result of the architecture of the system. We consider, using frame rules, how local properties of access control policies are maintained as the system architecture evolves
The increased awareness of the importance of data protection has made access control a relevant comp...
AbstractWe introduce a semantic approach to the study of logics for access control and dependency an...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Designing security, from the hardware level, is essential to ensure the integrity of the intelligent...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
System administrators specify the access control policy they want and implement the relevant configu...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
The increased awareness of the importance of data protection has made access control a relevant comp...
A uniform and precise framework for the specification of access control policies is proposed. The un...
The increased awareness of the importance of data protection has made access control a relevant comp...
AbstractWe introduce a semantic approach to the study of logics for access control and dependency an...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Designing security, from the hardware level, is essential to ensure the integrity of the intelligent...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
System administrators specify the access control policy they want and implement the relevant configu...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
The increased awareness of the importance of data protection has made access control a relevant comp...
A uniform and precise framework for the specification of access control policies is proposed. The un...
The increased awareness of the importance of data protection has made access control a relevant comp...
AbstractWe introduce a semantic approach to the study of logics for access control and dependency an...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...