A comprehensive modeling framework for role-based access control policies
AB Fadhel, D Bianculli, L Briand - Journal of Systems and Software, 2015 - Elsevier
Prohibiting unauthorized access to critical resources and data has become a major
requirement for enterprises; access control (AC) mechanisms manage requests from users …
requirement for enterprises; access control (AC) mechanisms manage requests from users …
Towards a modeling and analysis framework for privacy-aware systems
Nowadays, almost any software application deals with private information. However,
effective tools that support the specification and implementation of privacy-aware systems …
effective tools that support the specification and implementation of privacy-aware systems …
Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling
MA de Carvalho… - … Carnahan Conference on …, 2017 - ieeexplore.ieee.org
Objective: This article objective is to model authorization process from role-based access
control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via …
control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via …
RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications
MA Laverdière, K Julien, E Merlo - Information and Software Technology, 2021 - Elsevier
Abstract: Web applications often use Role-Based Access Control (RBAC) to restrict
operations and protect security sensitive information and resources. Context: Web …
operations and protect security sensitive information and resources. Context: Web …
Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)
MA Laverdière, E Merlo - … on Privacy, Security and Trust (PST), 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Their security may be affected by source code changes …
information and restrict operations. Their security may be affected by source code changes …
Detection of protection-impacting changes during software evolution
MA Laverdière, E Merlo - 2018 IEEE 25th International …, 2018 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is often used in web applications to restrict operations
and protect security sensitive information and resources. Web applications regularly …
and protect security sensitive information and resources. Web applications regularly …
Symbolic search of insider attack scenarios from a formal information system modeling
A Radhouani, A Idani, Y Ledru, N Ben Rajeb - Transactions on Petri Nets …, 2015 - Springer
The early detection of potential threats during the modelling and design phase of a Secure
Information System is required because it favours the design of a robust access control …
Information System is required because it favours the design of a robust access control …
Extraction of insider attack scenarios from a formal information system modeling
A Radhouani, A Idani, Y Ledru, NB Rajeb - Formal Methods for Security, 2014 - hal.science
The early detection of potential threats during the modelling phase of a Secure Information
System is required because it favours the design of a robust access control policy and the …
System is required because it favours the design of a robust access control policy and the …
Formal Model Driven Engineering
A Idani - 2023 - theses.hal.science
My research works are dedicated to the integration of two well known paradigms: Formal
Methods (FM) and Model-Driven Engineering (MDE). This integration is called Formal MDE …
Methods (FM) and Model-Driven Engineering (MDE). This integration is called Formal MDE …
Scalable GA processor architecture and its implementation of processor-element
T Imai, M Yoshikawa, H Terai… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
Genetic Algorithm (GA) is widely known as a general-purpose optimization method, which
can provide sub-optimum solutions for various. optimization problems by means of modeling …
can provide sub-optimum solutions for various. optimization problems by means of modeling …