Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

[PDF][PDF] Analysis and comparison of access control policies validation mechanisms

M Aqib, RA Shaikh - International Journal of Computer Network and …, 2015 - academia.edu
Validation and verification of security policies is a critical and important task to ensure that
access control policies are error free. The two most common problems present in access …

[HTML][HTML] Context-Aware Policy Analysis for Distributed Usage Control

G Gil, A Arnaiz, M Higuero, FJ Diez, E Jacob - Energies, 2022 - mdpi.com
To boost data spaces and benefit from the great opportunities that they present, data
sovereignty must be provided by Distributed Usage Control (DUC). Assuming that DUC will …

[PDF][PDF] Context-Aware Policy Analysis for Distributed Usage Control. Energies 2022, 15, 7113

G Gil, A Arnaiz, M Higuero, FJ Diez, E Jacob - 2022 - researchgate.net
To boost data spaces and benefit from the great opportunities that they present, data
sovereignty must be provided by Distributed Usage Control (DUC). Assuming that DUC will …