Quantifying permissiveness of access control policies

W Eiers, G Sankaran, A Li, E O'Mahony… - Proceedings of the 44th …, 2022 - dl.acm.org
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …

[PDF][PDF] Quantifying Permissiveness of Access Control Policies

W Eiers, G Sankaran, A Li, E O'Mahony, B Prince… - 2022 - scholar.archive.org
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …

Quantifying Permissiveness of Access Control Policies

W Eiers, G Sankaran, A Li, E O'Mahony… - 2022 IEEE/ACM 44th …, 2022 - computer.org
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …

[PDF][PDF] Quantifying permissiveness of access control policies

W Eiers, G Sankaran, A Li, E O'Mahony… - ICSE'22: Proceedings …, 2022 - par.nsf.gov
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …

[PDF][PDF] Quantifying Permissiveness of Access Control Policies

W Eiers, G Sankaran, A Li, E O'Mahony, B Prince… - 2022 - vlab.cs.ucsb.edu
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …

Quantifying Permissiveness of Access Control Policies

W Eiers, G Sankaran, A Li, E O'Mahony… - 2022 IEEE/ACM 44th …, 2022 - ieeexplore.ieee.org
Due to ubiquitous use of software services, protecting the confidentiality of private
information stored in compute clouds is becoming an increasingly critical problem. Although …