Benefits of location-based access control: A literature study

A Van Cleeff, W Pieters… - … & Int'l Conference on Cyber …, 2010 - ieeexplore.ieee.org
Location-based access control (LBAC) has been suggested as a means to improve IT
security. Bygrounding'users and systems to a particular location, attackers supposedly have …

Towards a theory of accountability and audit

R Jagadeesan, A Jeffrey, C Pitcher, J Riely - … Security–ESORICS 2009 …, 2009 - Springer
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means
to enforce authorization policies. In this paper, we describe an operational model of …

Policy auditing over incomplete logs: theory, implementation and applications

D Garg, L Jia, A Datta - Proceedings of the 18th ACM conference on …, 2011 - dl.acm.org
We present the design, implementation and evaluation of an algorithm that checks audit logs
for compliance with privacy and security policies. The algorithm, which we name reduce …

Conformance checking based on partially ordered event data

X Lu, D Fahland, WMP van der Aalst - … 7-8, 2014, Revised Papers 12, 2015 - Springer
Conformance checking is becoming more important for the analysis of business processes.
While the diagnosed results of conformance checking techniques are used in diverse …

Linking data and process perspectives for conformance analysis

M Alizadeh, X Lu, D Fahland, N Zannone… - Computers & …, 2018 - Elsevier
The detection of data breaches has become a major challenge for most organizations. The
problem lies in the fact that organizations often lack proper mechanisms to control and …

Planar catadioptric stereo: Geometry and calibration

J Gluckman, SK Nayar - Proceedings. 1999 IEEE Computer …, 1999 - ieeexplore.ieee.org
By using mirror reflections of a scene, stereo images can be captured with a single camera
(catadioptric stereo). Single camera stereo provides both geometric and radiometric …

Examining trust, forgiveness and regret as computational concepts

S Marsh, P Briggs - Computing with social trust, 2009 - Springer
The study of trust has advanced tremendously in recent years, to the extent that the goal of a
more unified formalisation of the concept is becoming feasible. To that end, we have begun …

Privacy-aware collaborative access control in web-based social networks

B Carminati, E Ferrari - Data and Applications Security XXII: 22nd Annual …, 2008 - Springer
Access control over resources shared by social network users is today receiving growing
attention due to the widespread use of social networks not only for recreational but also for …

A posteriori compliance control

S Etalle, WH Winsborough - Proceedings of the 12th ACM symposium …, 2007 - dl.acm.org
While preventative policy enforcement mechanisms can provide theoretical guarantees that
policy is correctly enforced, they have limitations in practice. They are inflexible when …

A modal deconstruction of access control logics

D Garg, M Abadi - International Conference on Foundations of Software …, 2008 - Springer
We present a translation from a logic of access control with a “says” operator to the classical
modal logic S4. We prove that the translation is sound and complete. We also show that it …