A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
The ELDARICA horn solver
This paper presents the ELDARICA version 2 model checker. Over the last years we have
been developing and maintaining ELDARICA as a state-of-the-art solver for Horn clauses …
been developing and maintaining ELDARICA as a state-of-the-art solver for Horn clauses …
Smt-based verification of ngac policies
V Dubrovenski, E Chen, D Xu - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
Next Generation Access Control (NGAC) is a standard for implementing attribute-based
access control in computer software. It allows for run-time privilege changes through …
access control in computer software. It allows for run-time privilege changes through …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
Combining solution reuse and bound tightening for efficient analysis of evolving systems
Software engineers have long employed formal verification to ensure the safety and validity
of their system designs. As the system changes---often via predictable, domain-specific …
of their system designs. As the system changes---often via predictable, domain-specific …
A role-based administrative model for administration of heterogeneous access control policies and its security analysis
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …
enforcement of flexible and dynamic access control policies using traditional access control …
Static analysis for proactive security
M Huth, F Nielson - Computing and Software Science: State of the Art and …, 2019 - Springer
We reflect on current problems and practices in system security, distinguishing between
reactive security–which deals with vulnerabilities as they are being exploited–and proactive …
reactive security–which deals with vulnerabilities as they are being exploited–and proactive …
Cryptographically enforced role-based access control for NoSQL distributed databases
Y Shalabi, E Gudes - Data and Applications Security and Privacy XXXI …, 2017 - Springer
Abstract The support for Role-Based Access Control (RBAC) using cryptography for NOSQL
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …
distributed databases is investigated. Cassandra is a NoSQL DBMS that efficiently supports …
Securing Cloud Computing Using Access Control Systems: A Comprehensive Review
AJ Mohammed, SJ Mohammed - … Networks and Sustainability in the AIoT …, 2024 - Springer
Access control management systems play a crucial role in the infrastructure of cloud
computing, relying on providing and managing access to computer resources. These …
computing, relying on providing and managing access to computer resources. These …
Compositional typed analysis of ARBAC policies
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …
effectiveness is hindered by the exponential explosion of the ways in which different users …