Auditing file system permissions using association rule mining

S Parkinson, V Somaraki, R Ward - Expert Systems with Applications, 2016 - Elsevier
Identifying irregular file system permissions in large, multi-user systems is challenging due
to the complexity of gaining structural understanding from large volumes of permission …

WorSE: a workbench for model-based security engineering

P Amthor, WE Kühnhauser, A Pölck - Computers & Security, 2014 - Elsevier
IT systems with sophisticated security requirements increasingly apply problem-specific
security policies for specifying, analyzing, and implementing security properties. Due to their …

Model-based safety analysis of SELinux security policies

P Amthor, WE Kühnhauser… - 2011 5th International …, 2011 - ieeexplore.ieee.org
Since security has become an essential asset in numerous application areas, the integration
of security policies has become a major issue in the design of security architectures, and …

Identification of irregularities and allocation suggestion of relative file system permissions

S Parkinson, A Crampton - Journal of information security and applications, 2016 - Elsevier
It is well established that file system permissions in large, multi-user environments can be
audited to identify vulnerabilities with respect to what is regarded as standard practice. For …

iOracle: Automated evaluation of access control policies in iOS

L Deshotels, R Deaconescu, C Carabas… - Proceedings of the …, 2018 - dl.acm.org
Modern operating systems, such as iOS, use multiple access control policies to define an
overall protection system. However, the complexity of these policies and their interactions …

[PDF][PDF] Efficient Heuristic Safety Analysis of Core-based Security Policies.

P Amthor - SECRYPT, 2017 - scitepress.org
Being of paramount importance for the correctness of a security policy, the property of safety
has received decades of attention in the field of model-based security engineering. To …

A uniform modeling pattern for operating systems access control policies with an application to SELinux

P Amthor - 2015 12th International Joint Conference on e …, 2015 - ieeexplore.ieee.org
Modern operating systems increasingly rely on enforcing mandatory access control through
the use of security policies. Given the critical property of policy correctness in such systems …

[PDF][PDF] Small TCBs of policy-controlled operating systems

A Pölck - 2014 - d-nb.info
IT systems with advanced security requirements increasingly apply problem-specific security
policies for describing, analyzing, and implementing security properties. Security policies …

The entity labeling pattern for modeling operating systems access control

P Amthor - … : 12th International Joint Conference, ICETE 2015 …, 2016 - Springer
To meet tightening security requirements, modern operating systems enforce mandatory
access control based on formal security policies. To ensure the critical property of policy …

Evaluating and comparing the quality of access control in different operating systems

L Cheng, Y Zhang, Z Han, Y Deng, X Sun, D Feng - Computers & security, 2014 - Elsevier
Access control mechanisms (ACMs) have been widely used by operating systems (OSes) to
protect information security. However, it is often challenging to evaluate and compare the …