Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

[HTML][HTML] MulVAL: A logic-based network security analyzer.

X Ou, S Govindavajhala, AW Appel - USENIX security symposium, 2005 - usenix.org
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …

Understanding android security

W Enck, M Ongtang, P McDaniel - IEEE security & privacy, 2009 - ieeexplore.ieee.org
Google's Android platform is a widely anticipated open source operating system for mobile
phones. This article describes Android's security model and attempts to unmask the …

Semantic-based automated reasoning for AWS access policies using SMT

J Backes, P Bolignano, B Cook… - … Formal Methods in …, 2018 - ieeexplore.ieee.org
Cloud computing provides on-demand access to IT resources via the Internet. Permissions
for these resources are defined by expressive access control policies. This paper presents a …

Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …

Declarative networking

BT Loo, T Condie, M Garofalakis, DE Gay… - Communications of the …, 2009 - dl.acm.org
Declarative Networking is a programming methodology that enables developers to concisely
specify network protocols and services, which are directly compiled to a dataflow framework …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …