A framework of composable access control features: Preserving separation of access control concerns from models to code
Modeling of security policies, along with their realization in code, must be an integral part of
the software development process, to achieve an acceptable level of security for a software …
the software development process, to achieve an acceptable level of security for a software …
Réécriture et Modularité pour les Politiques de Sécurité
AS de Oliveira - 2008 - theses.hal.science
Dans cette thèse, nous nous intéressons à la spécification et à l'analyse modulaires de
politiques de sécurité flexibles basées sur des règles. Nous introduisons l'utilisation du …
politiques de sécurité flexibles basées sur des règles. Nous introduisons l'utilisation du …
A framework for security assurance of access control enforcement code
Modeling of access control policies, along with their implementation in code, must be an
integral part of the software development process, to ensure that the proper level of security …
integral part of the software development process, to ensure that the proper level of security …
Advice from belnap policies
Coordination languages for mobile, distributed systems constitute a good basis for the use of
aspect-oriented features for providing a clear separation between the functionality and the …
aspect-oriented features for providing a clear separation between the functionality and the …
Advice for coordination
We show how to extend a coordination language with support for aspect oriented
programming. The main challenge is how to properly deal with the trapping of actions before …
programming. The main challenge is how to properly deal with the trapping of actions before …
Predictive access control for distributed computation
We show how to use aspect-oriented programming to separate security and trust issues from
the logical design of mobile, distributed systems. The main challenge is how to enforce …
the logical design of mobile, distributed systems. The main challenge is how to enforce …
Aspects with program analysis for security policies
F Yang - 2010 - orbit.dtu.dk
Enforcing security policies to IT systems, especially for a mobile distributed system, is
challenging. As society becomes more IT-savvy, our expectations about security and privacy …
challenging. As society becomes more IT-savvy, our expectations about security and privacy …
Secondary use of data in EHR systems
We show how to use aspect-oriented programming to separate security and trust issues from
the logical design of mobile, distributed systems. The main challenge is how to enforce …
the logical design of mobile, distributed systems. The main challenge is how to enforce …
Rewriting and modularity for security policies
AS de Oliveira - 2008 - hal.univ-lorraine.fr
In this thesis we address the modular specification and analysis of flexible, rule-based
policies. We introduce the use of the strategic rewriting formalism in this domain, such that …
policies. We introduce the use of the strategic rewriting formalism in this domain, such that …
Distributed security in closed distributed systems
AM Hernandez - 2012 - orbit.dtu.dk
Distributed security in closed distributed systems Page 1 General rights Copyright and moral
rights for the publications made accessible in the public portal are retained by the authors and/or …
rights for the publications made accessible in the public portal are retained by the authors and/or …