-
1
-
-
37149016197
-
-
Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, Springer, Heidelberg
-
Abdulla, P.A., Delzanno, G., Ben Henda, N., Rezine, A.: Regular Model Checking Without Transducers (On Efficient Verification of Parameterized Systems). In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 721-736. Springer, Heidelberg (2007
-
(2007)
Regular Model Checking Without Transducers (On Efficient Verification of Parameterized Systems
, vol.4424
, pp. 721-736
-
-
Abdulla, P.A.1
Delzanno, G.2
Ben Henda, N.3
Rezine, A.4
-
2
-
-
80051694398
-
-
Bjørner, N., Sofronie-Stokkermans, V. (eds.) CADE 2011. LNCS, Springer, Heidelberg
-
Alberti, F., Armando, A., Ranise, S.: ASASP: Automated Symbolic Analysis of Security Policies. In: Bjørner, N., Sofronie-Stokkermans, V. (eds.) CADE 2011. LNCS, vol. 6803, pp. 26-33. Springer, Heidelberg (2011
-
(2011)
ASASP: Automated Symbolic Analysis of Security Policies
, vol.6803
, pp. 26-33
-
-
Alberti, F.1
Armando, A.2
Ranise, S.3
-
3
-
-
85175131449
-
Efficient symbolic automated analysis of administrative role based access control policies. in: 6th
-
Alberti, F., Armando, A., Ranise, S.: Efficient Symbolic Automated Analysis of Administrative Role Based Access Control Policies. In: 6th ACM Symp. on Information, Computer, and Communications Security, ASIACCS (2011
-
(2011)
ACM Symp. on Information, Computer, and Communications Security, ASIACCS
-
-
Alberti, F.1
Armando, A.2
Ranise, S.3
-
4
-
-
77953246991
-
-
Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, Springer, Heidelberg
-
Armando, A., Ponta, S.E.: Model Checking of Security-sensitive Business Processes. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 66-80. Springer, Heidelberg (2010
-
(2010)
Model Checking of Security-Sensitive Business Processes
, vol.5983
, pp. 66-80
-
-
Armando, A.1
Ponta, S.E.2
-
5
-
-
80054066184
-
-
Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, Springer, Heidelberg
-
Armando, A., Ranise, S.: Automated Symbolic Analysis of ARBAC Policies. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 17-34. Springer, Heidelberg (2011
-
(2011)
Automated Symbolic Analysis of ARBAC Policies
, vol.6710
, pp. 17-34
-
-
Armando, A.1
Ranise, S.2
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 65-104 (1999
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
33750027244
-
Modelling and resource allocation planning of BPEL workflows under security constraints
-
Cerone, A., Xiangpeng, Z., Krishnan, P.: Modelling and resource allocation planning of BPEL workflows under security constraints. Technical Report 336, UNU-IIST (2006
-
(2006)
Technical Report 336, UNU-IIST
-
-
Cerone, A.1
Xiangpeng, Z.2
Krishnan, P.3
-
9
-
-
30644475116
-
A reference monitor for workflow systems with constrained task execution
-
DOI 10.1145/1063979.1063986, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: 10th ACM SACMAT, pp. 38-47. ACM (2005 (Pubitemid 43087459)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 38-47
-
-
Crampton, J.1
-
10
-
-
47949104986
-
Formal verification of business workflows and role based access control systems
-
Dury, A., Boroday, S., Petrenko, A., Lotz, V.: Formal verification of business workflows and role based access control systems. In: SECURWARE, pp. 201-2010 (2007
-
(2007)
SECURWARE
, pp. 201-2010
-
-
Dury, A.1
Boroday, S.2
Petrenko, A.3
Lotz, V.4
-
12
-
-
84959051487
-
-
Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, Springer, Heidelberg
-
Fu, X., Bultan, T., Su, J.: Formal Verification of E-Services and Workflows. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 188-202. Springer, Heidelberg (2002
-
(2002)
Formal Verification of E-Services and Workflows
, vol.2512
, pp. 188-202
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
13
-
-
79951864962
-
Backward reachability of array-based systems by smt solving: Termination and invariant synthesis
-
Ghilardi, S., Ranise, S.: Backward reachability of array-based systems by smt solving: Termination and invariant synthesis. In: LMCS, vol. 6(4) (2010
-
(2010)
LMCS
, vol.6
, Issue.4
-
-
Ghilardi, S.1
Ranise, S.2
-
14
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM 19(8), 461-471 (1976
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
17
-
-
33845517298
-
Security analysis in role-based access control
-
DOI 10.1145/1187441.1187442
-
Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC) 9(4), 391-420 (2006 (Pubitemid 44927156)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.4
, pp. 391-420
-
-
Li, N.1
Tripunitara, M.V.2
-
18
-
-
84872926312
-
Improving Control Flow Verification in a Business Process using an Extended Petri Net
-
Monakova, G., Kopp, O., Leymann, F.: Improving Control Flow Verification in a Business Process using an Extended Petri Net. In: 1st Central-European Workshop on Services and their Composition, ZEUS (2009
-
(2009)
1st Central-European Workshop on Services and their Composition, ZEUS
-
-
Monakova, G.1
Kopp, O.2
Leymann, F.3
-
20
-
-
0030086382
-
-
IEEE Computer
-
Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-Based Access Control Models. IEEE Computer 2(29), 38-47 (1996
-
(1996)
Role-Based Access Control Models.
, vol.2
, Issue.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youmann, C.4
-
21
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT, pp. 139-149. ACM (2006 (Pubitemid 44300751)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
23
-
-
78651384017
-
Satisfiability and resiliency in workflow authorization systems
-
Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13, 40:1-40:35 (2010
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 401-4035
-
-
Wang, Q.1
Li, N.2
-
24
-
-
57049089483
-
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, Springer, Heidelberg
-
Wang, Q., Li, N., Chen, H.: On the Security of Delegation in Access Control Systems. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 317-332. Springer, Heidelberg (2008)
-
(2008)
On the Security of Delegation in Access Control Systems
, vol.5283
, pp. 317-332
-
-
Wang, Q.1
Li, N.2
Chen, H.3
|