-
1
-
-
47949117591
-
Model Checking Access Control in Business Workflow
-
Technical Report CRIM-06/10-11, CRIM, Montreal, November
-
A. Dury, S. Boroday, A. Petrenko, V. Lotz, Model Checking Access Control in Business Workflow, Technical Report CRIM-06/10-11, CRIM, Montreal, November 2006.
-
(2006)
-
-
Dury, A.1
Boroday, S.2
Petrenko, A.3
Lotz, V.4
-
4
-
-
35248881970
-
Visual specifications of policies and their verification, Workshop on Fundamental Approaches to Software Engineering
-
M. Koch, F. Parisi-Presicce, "Visual specifications of policies and their verification", Workshop on Fundamental Approaches to Software Engineering, LNCS 2621, 2003.
-
(2003)
LNCS
, vol.2621
-
-
Koch, M.1
Parisi-Presicce, F.2
-
6
-
-
47949114635
-
-
J. Zao, H. Wee. J .Chu, D. Jackson, RBAC schema verification using lightweight formal model and constraint analysis, ACM Symposium on Access Control Models and Technologies, 2003.
-
J. Zao, H. Wee. J .Chu, D. Jackson, "RBAC schema verification using lightweight formal model and constraint analysis", ACM Symposium on Access Control Models and Technologies, 2003.
-
-
-
-
8
-
-
33244455252
-
Automated verification of access control policies
-
Technical Report 2004-22, University of California, Santa Barbara
-
G. Hughes, T. Bultan, Automated verification of access control policies, Technical Report 2004-22, University of California, Santa Barbara, 2004.
-
(2004)
-
-
Hughes, G.1
Bultan, T.2
-
11
-
-
24644445703
-
Conformance checking of RBAC policy and its implementation
-
The First Information Security Practice and Experience Conference
-
F. Hansen, V. Oleshchuk, "Conformance checking of RBAC policy and its implementation", The First Information Security Practice and Experience Conference, LNCS 3439, 2005.
-
(2005)
LNCS
, vol.3439
-
-
Hansen, F.1
Oleshchuk, V.2
-
12
-
-
35248838889
-
Formal security policy verification of distributed component-structured software
-
23rd IFIP Intl. Conf. on Formal Techniques for Networked and Distributed Systems
-
P. Herrmann, "Formal security policy verification of distributed component-structured software", 23rd IFIP Intl. Conf. on Formal Techniques for Networked and Distributed Systems, LNCS 2767, 2003.
-
(2003)
LNCS
, vol.2767
-
-
Herrmann, P.1
-
13
-
-
24344447997
-
Typed static analysis for concurrent policy-based resource access control
-
Unpublished draft
-
N. Nguyen, J. Rathke, "Typed static analysis for concurrent policy-based resource access control", Unpublished draft, http://www.cogs.susx.ac.uk/users/julianr/pubs/dist-access.html, 2005.
-
(2005)
-
-
Nguyen, N.1
Rathke, J.2
-
15
-
-
47949129131
-
-
Woflan tool (on-line) http://is.tm.tue.nl/research/woflan/
-
Woflan tool (on-line) http://is.tm.tue.nl/research/woflan/
-
-
-
-
16
-
-
0141444731
-
-
SPIN
-
W. Janssen, R. Mateescu, S. Mauw, P. Fennema, P. Stappen, "Model checking for managers", SPIN 1999.
-
(1999)
Model checking for managers
-
-
Janssen, W.1
Mateescu, R.2
Mauw, S.3
Fennema, P.4
Stappen, P.5
-
18
-
-
47949091355
-
-
WSAT Tool
-
WSAT Tool: http://www.cs.ucsb.edu/~su/WSAT/
-
-
-
-
22
-
-
33845389592
-
A functional solution for goal-oriented policy refinement
-
J. Rubio-Loyola, J. Serrat, M. Charalambides, P. Flegkas, G. Pavlou, "A functional solution for goal-oriented policy refinement", Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), 2006.
-
(2006)
Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
-
-
Rubio-Loyola, J.1
Serrat, J.2
Charalambides, M.3
Flegkas, P.4
Pavlou, G.5
-
24
-
-
47949124117
-
-
S. Jha, N. Li, M. Tripunitara, Q. Wang, W. Winsborough, Security analysis and administrative insider threat assessment in role-based access control, CERIAS Tech Report 2005-77, Center for Education and Research in Information Assurance and Security, Purdue University, 2005.
-
S. Jha, N. Li, M. Tripunitara, Q. Wang, W. Winsborough, Security analysis and administrative insider threat assessment in role-based access control, CERIAS Tech Report 2005-77, Center for Education and Research in Information Assurance and Security, Purdue University, 2005.
-
-
-
-
26
-
-
0043159688
-
Temporal and Modal Logic, In Handbook of Theoretical Computer Science
-
Elsevier
-
E.A. Emerson, Temporal and Modal Logic, In Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics, Elsevier, 1990.
-
(1990)
Formal Models and Semantics
, vol.B
-
-
Emerson, E.A.1
-
29
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
J. Bacon, K. Moody, W. Yao, "A model of OASIS role-based access control and its support for active security":, ACM Trans. Inf. Syst. Secur., 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
30
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control", ACM Transactions on Information and System Security, Vol.4, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
31
-
-
35048849152
-
Information Security
-
pp
-
DP Guelev, M Ryan, PY Schobbens, Information Security, "Model-checking access control policies", pp219-230, 2004.
-
(2004)
Model-checking access control policies
, pp. 219-230
-
-
Guelev, D.P.1
Ryan, M.2
Schobbens, P.Y.3
-
33
-
-
33244470893
-
Change management: Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L.A. Meyerovich, M.C. Tschantz, "Change management: verification and change-impact analysis of access-control policies", 27th Intl. Conf. on Software engineering, 2005.
-
(2005)
27th Intl. Conf. on Software engineering
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
|