Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

[图书][B] Attribute-based access control models and implementation in cloud infrastructure as a service

X Jin - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …

Reachability analysis for attributes in ABAC with group hierarchy

M Gupta, R Sandhu, T Mawla… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Attribute-based access control (ABAC) models are widely used to provide fine-grained and
adaptable authorization based on the attributes of users, resources, and other relevant …

Dynamic counter-measures for risk-based access control systems: An evolutive approach

D Díaz-López, G Dólera-Tormo… - Future Generation …, 2016 - Elsevier
Risk-based access control systems are a new element in access control categories,
incorporating risk analysis as part of the inputs to consider when taking an authorization …

Efficient symbolic automated analysis of administrative attribute-based RBAC-policies

F Alberti, A Armando, S Ranise - … of the 6th ACM symposium on …, 2011 - dl.acm.org
Automated techniques for the security analysis of Role-Based Access Control (RBAC)
access control policies are crucial for their design and maintenance. The definition of …

Policy analysis for self-administrated role-based access control

AL Ferrara, P Madhusudan, G Parlato - … , TACAS 2013, Held as Part of the …, 2013 - Springer
Current techniques for security analysis of administrative role-based access control
(ARBAC) policies restrict themselves to the separate administration assumption that …

A security modeling and verification method of embedded software based on Z and MARTE

X Hu, Y Zhuang, F Zhang - Computers & Security, 2020 - Elsevier
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …

Security analysis of role-based access control through program verification

AL Ferrara, P Madhusudan… - 2012 IEEE 25th Computer …, 2012 - ieeexplore.ieee.org
We propose a novel scheme for proving administrative role-based access control (ARBAC)
policies correct with respect to security properties using the powerful abstraction-based tools …

WorSE: a workbench for model-based security engineering

P Amthor, WE Kühnhauser, A Pölck - Computers & Security, 2014 - Elsevier
IT systems with sophisticated security requirements increasingly apply problem-specific
security policies for specifying, analyzing, and implementing security properties. Due to their …

Abductive analysis of administrative policies in rule-based access control

P Gupta, SD Stoller, Z Xu - IEEE Transactions on Dependable …, 2013 - ieeexplore.ieee.org
In large organizations, access control policies are managed by multiple users
(administrators). An administrative policy specifies how each user in an enterprise may …