A comprehensive approach to the automatic refinement and verification of access control policies

M Cheminod, L Durante, L Seno, F Valenza… - Computers & …, 2019 - Elsevier
Access control is one of the building blocks of network security and is often managed by
network administrators through the definition of sets of high-level policies meant to regulate …

A survey of policy refinement methods as a support for sustainable networks

AC Riekstin, GC Januario, BB Rodrigues… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Green sustainability-oriented features have become common in network nodes and
protocols. Running a network in an energy-efficient way is an important concern of network …

A datalog framework for modeling relationship-based access control policies

E Pasarella, J Lobo - Proceedings of the 22nd ACM on Symposium on …, 2017 - dl.acm.org
Relationships like friendship to limit access to resources have been part of social network
applications since their beginnings. Describing access control policies in terms of …

Distributed intelligence: Trends in the management of complex systems

SB Calo, DC Verma, E Bertino - Proceedings of the 22Nd ACM on …, 2017 - dl.acm.org
The ability to incorporate intelligence in even small devices and to make use of contextual
information from widely deployed sensors has already begun to change management …

Declarative framework for specification, simulation and analysis of distributed applications

J Ma, F Le, A Russo, J Lobo - IEEE Transactions on Knowledge …, 2016 - ieeexplore.ieee.org
Researchers have recently shown that declarative database query languages, such as
Datalog, could naturally be used to specify and implement network protocols and services …

Scalable and secure concurrent evaluation of history-based access control policies

M Decat, B Lagaisse, W Joosen - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Many of today's applications are deployed on large-scale distributed infrastructures to
handle large amounts of users concurrently. When applying access control to such …

Fast distributed evaluation of stateful attribute-based access control policies

T Bui, SD Stoller, S Sharma - IFIP Annual Conference on Data and …, 2017 - Springer
Separation of access control logic from other components of applications facilitates uniform
enforcement of policies across applications in enterprise systems. This approach is popular …