Monitoring security policies with metric first-order temporal logic

D Basin, F Klaedtke, S Müller - Proceedings of the 15th ACM symposium …, 2010 - dl.acm.org
We show the practical feasibility of monitoring complex security properties using a runtime
monitoring approach for metric first-order temporal logic. In particular, we show how a wide …

Dynamic access control policies: Specification and verification

H Janicke, A Cau, F Siewe, H Zedan - The Computer Journal, 2013 - academic.oup.com
Security requirements deal with the protection of assets against unauthorized access
(disclosure or modification) and their availability to authorized users. Temporal constraints of …

[PDF][PDF] A policy-based management approach to security in cloud systems.

N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …

[PDF][PDF] Interval temporal logic

A Cau, B Moszkowski, H Zedan - URL: http://www. cms. dmu. ac …, 2006 - antonio-cau.co.uk
Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first-
order reasoning about periods of time found in descriptions of hardware and software …

Verification and enforcement of access control policies

A Cau, H Janicke, B Moszkowski - Formal Methods in System Design, 2013 - Springer
Access control mechanisms protect critical resources of systems from unauthorized access.
In a policy-based management approach, administrators define user privileges as rules that …

Concurrent enforcement of usage control policies

H Janicke, A Cau, F Siewe… - 2008 IEEE Workshop on …, 2008 - ieeexplore.ieee.org
Policy-based approaches to the management of systems distinguish between the
specification of requirements, in the form of policies, and their enforcement on the system. In …

The specification and design of secure context-aware workflows

H Zedan, S Al-Sultan - Expert Systems with Applications, 2017 - Elsevier
There are two major concerns in the development of current workflow system. The first is
security considerations and the second is context awareness. Modern workflow systems …

Low-latency service data aggregation using policy obligations

S Reiff-Marganiec, M Tilly… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
The Internet of Things, large scale sensor networks or even in social media, are now well
established and their use is growing daily. Usage scenarios in these fields highlight the …

On usage control in data grids

F Stagni, A Arenas, B Aziz, F Martinelli - … , West Lafayette, IN, USA, June 15 …, 2009 - Springer
This paper reasons on usage control in Data Grids. We adapt the UCON abc usage control
framework for the case of distributed systems with multiple authoritative points. We call it the …

Decentralized XACML overlay network

A Alzahrani, H Janicke… - 2010 10th IEEE …, 2010 - ieeexplore.ieee.org
We propose a novel approach for the collaborative enforcement of security policies in
distributed systems that is based on the dynamic (re-) deployment of multiple PDPs. The …