A framework of composable access control features: Preserving separation of access control concerns from models to code

JA Pavlich-Mariscal, SA Demurjian, LD Michel - Computers & Security, 2010 - Elsevier
Modeling of security policies, along with their realization in code, must be an integral part of
the software development process, to achieve an acceptable level of security for a software …

Réécriture et Modularité pour les Politiques de Sécurité

AS de Oliveira - 2008 - theses.hal.science
Dans cette thèse, nous nous intéressons à la spécification et à l'analyse modulaires de
politiques de sécurité flexibles basées sur des règles. Nous introduisons l'utilisation du …

A framework for security assurance of access control enforcement code

JA Pavlich-Mariscal, SA Demurjian, LD Michel - Computers & Security, 2010 - Elsevier
Modeling of access control policies, along with their implementation in code, must be an
integral part of the software development process, to ensure that the proper level of security …

Advice from belnap policies

C Hankin, F Nielson, HR Nielson - 2009 22nd IEEE Computer …, 2009 - ieeexplore.ieee.org
Coordination languages for mobile, distributed systems constitute a good basis for the use of
aspect-oriented features for providing a clear separation between the functionality and the …

Advice for coordination

C Hankin, F Nielson, H Riis Nielson, F Yang - Coordination Models and …, 2008 - Springer
We show how to extend a coordination language with support for aspect oriented
programming. The main challenge is how to properly deal with the trapping of actions before …

Predictive access control for distributed computation

F Yang, C Hankin, F Nielson, HR Nielson - Science of Computer …, 2013 - Elsevier
We show how to use aspect-oriented programming to separate security and trust issues from
the logical design of mobile, distributed systems. The main challenge is how to enforce …

Aspects with program analysis for security policies

F Yang - 2010 - orbit.dtu.dk
Enforcing security policies to IT systems, especially for a mobile distributed system, is
challenging. As society becomes more IT-savvy, our expectations about security and privacy …

Secondary use of data in EHR systems

F Yang, C Hankin, F Nielson, HR Nielson - arXiv preprint arXiv:1201.4262, 2012 - arxiv.org
We show how to use aspect-oriented programming to separate security and trust issues from
the logical design of mobile, distributed systems. The main challenge is how to enforce …

Rewriting and modularity for security policies

AS de Oliveira - 2008 - hal.univ-lorraine.fr
In this thesis we address the modular specification and analysis of flexible, rule-based
policies. We introduce the use of the strategic rewriting formalism in this domain, such that …

Distributed security in closed distributed systems

AM Hernandez - 2012 - orbit.dtu.dk
Distributed security in closed distributed systems Page 1 General rights Copyright and moral
rights for the publications made accessible in the public portal are retained by the authors and/or …