AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal propertie...
AbstractWe define a framework for the analysis of access control policies that aims at easing the sp...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A uniform and precise framework for the specification of access control policies is proposed. The un...
We describe a uniform logical framework, based on a bunched logic that combines classical additives ...
AbstractPolicies are used to control the behavior of large-scale systems. After policies are designe...
Models of Access Control Policies specified with graphs and graph transformation rules combine an i...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
AbstractWe define a framework for the analysis of access control policies that aims at easing the sp...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A uniform and precise framework for the specification of access control policies is proposed. The un...
We describe a uniform logical framework, based on a bunched logic that combines classical additives ...
AbstractPolicies are used to control the behavior of large-scale systems. After policies are designe...
Models of Access Control Policies specified with graphs and graph transformation rules combine an i...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
AbstractWe define a framework for the analysis of access control policies that aims at easing the sp...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...