A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

The ELDARICA horn solver

H Hojjat, P Rümmer - 2018 Formal Methods in Computer Aided …, 2018 - ieeexplore.ieee.org
This paper presents the ELDARICA version 2 model checker. Over the last years we have
been developing and maintaining ELDARICA as a state-of-the-art solver for Horn clauses …

Smt-based verification of ngac policies

V Dubrovenski, E Chen, D Xu - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
Next Generation Access Control (NGAC) is a standard for implementing attribute-based
access control in computer software. It allows for run-time privilege changes through …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

Combining solution reuse and bound tightening for efficient analysis of evolving systems

C Stevens, H Bagheri - Proceedings of the 31st ACM SIGSOFT …, 2022 - dl.acm.org
Software engineers have long employed formal verification to ensure the safety and validity
of their system designs. As the system changes---often via predictable, domain-specific …

A role-based administrative model for administration of heterogeneous access control policies and its security analysis

MP Singh, S Sural, J Vaidya, V Atluri - Information Systems Frontiers, 2021 - Springer
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …

Static analysis for proactive security

M Huth, F Nielson - Computing and Software Science: State of the Art and …, 2019 - Springer
We reflect on current problems and practices in system security, distinguishing between
reactive security–which deals with vulnerabilities as they are being exploited–and proactive …

Cryptographically enforced role-based access control for NoSQL distributed databases

Y Shalabi, E Gudes - Data and Applications Security and Privacy XXXI …, 2017 - Springer
Abstract The support for Role-Based Access Control (RBAC) using cryptography for NOSQL
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …

Securing Cloud Computing Using Access Control Systems: A Comprehensive Review

AJ Mohammed, SJ Mohammed - … Networks and Sustainability in the AIoT …, 2024 - Springer
Access control management systems play a crucial role in the infrastructure of cloud
computing, relying on providing and managing access to computer resources. These …

Compositional typed analysis of ARBAC policies

S Calzavara, A Rabitti, M Bugliesi - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …