A comprehensive approach to the automatic refinement and verification of access control policies

M Cheminod, L Durante, L Seno, F Valenza… - Computers & …, 2019 - Elsevier
Access control is one of the building blocks of network security and is often managed by
network administrators through the definition of sets of high-level policies meant to regulate …

[PDF][PDF] Verification and test methods for access control policies/models

VC Hu, R Kuhn, D Yaga - NIST Special Publication, 2017 - academia.edu
Access control systems are among the most critical of computer security components. Faulty
policies, misconfigurations, or flaws in software implementations can result in serious …

Modeling multi-layer access control policies of a hyperledger-fabric-based agriculture supply chain

HMND Bandara, S Chen, M Staples… - 2021 Third IEEE …, 2021 - ieeexplore.ieee.org
Transparency and immutability properties of blockchains enhance traceability and trust in
supply chains. However, supply chain participants resist storing most data on blockchains …

Evaluating the capability and performance of access control policy verification tools

A Li, Q Li, VC Hu, J Di - MILCOM 2015-2015 IEEE Military …, 2015 - ieeexplore.ieee.org
Access control has been used in many systems such as military systems and business
information systems. Access control protects sensitive information based on access control …

Towards an access control model for collaborative healthcare systems

M Abomhara, GM Køien - International Conference on Health …, 2016 - scitepress.org
In this study, an access control model for collaborative healthcare systems is proposed.
Collaboration requirements, patient data confidentiality and the need for flexible access for …

[图书][B] Machine learning for access control policy verification

VC Hu, VC Hu - 2021 - academia.edu
Access control policy verification ensures that there are no faults within the policy that leak or
block access privileges. As a software test, access control policy verification relies on …

Controlled BTG: toward flexible emergency override in interoperable medical systems

Q Tasali, C Sublett… - EAI Endorsed Transactions …, 2020 - publications.eai.eu
INTRODUCTION: In medical cyber-physical systems (mCPS), availability must be prioritized
over other security properties, making it challenging to craft least-privilege authorization …

Model checking access control policies: A case study using google cloud iam

A Gouglidis, A Kagia, VC Hu - arXiv preprint arXiv:2303.16688, 2023 - arxiv.org
Authoring access control policies is challenging and prone to misconfigurations. Access
control policies must be conflict-free. Hence, administrators should identify discrepancies …

Using Expert Systems to Statically Detect" Dynamic" Conflicts in XACML

B Stepien, A Felty - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
Policy specification languages such as XACML often provide mechanisms to resolve
dynamic conflicts that occur when trying to determine if a request should be permitted or …

Mutation testing of access control policies

G Cherneva, P Khalimov - Advanced Information Systems, 2021 - ais.khpi.edu.ua
One of the most important and integral components of modern computer security are access
control systems. The objective of an access control system (ACS) is often described in terms …