A comprehensive modeling framework for role-based access control policies

AB Fadhel, D Bianculli, L Briand - Journal of Systems and Software, 2015 - Elsevier
Prohibiting unauthorized access to critical resources and data has become a major
requirement for enterprises; access control (AC) mechanisms manage requests from users …

Towards a modeling and analysis framework for privacy-aware systems

P Colombo, E Ferrari - … on Privacy, Security, Risk and Trust and …, 2012 - ieeexplore.ieee.org
Nowadays, almost any software application deals with private information. However,
effective tools that support the specification and implementation of privacy-aware systems …

Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling

MA de Carvalho… - … Carnahan Conference on …, 2017 - ieeexplore.ieee.org
Objective: This article objective is to model authorization process from role-based access
control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via …

RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications

MA Laverdière, K Julien, E Merlo - Information and Software Technology, 2021 - Elsevier
Abstract: Web applications often use Role-Based Access Control (RBAC) to restrict
operations and protect security sensitive information and resources. Context: Web …

Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)

MA Laverdière, E Merlo - … on Privacy, Security and Trust (PST), 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Their security may be affected by source code changes …

Detection of protection-impacting changes during software evolution

MA Laverdière, E Merlo - 2018 IEEE 25th International …, 2018 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is often used in web applications to restrict operations
and protect security sensitive information and resources. Web applications regularly …

Symbolic search of insider attack scenarios from a formal information system modeling

A Radhouani, A Idani, Y Ledru, N Ben Rajeb - Transactions on Petri Nets …, 2015 - Springer
The early detection of potential threats during the modelling and design phase of a Secure
Information System is required because it favours the design of a robust access control …

Extraction of insider attack scenarios from a formal information system modeling

A Radhouani, A Idani, Y Ledru, NB Rajeb - Formal Methods for Security, 2014 - hal.science
The early detection of potential threats during the modelling phase of a Secure Information
System is required because it favours the design of a robust access control policy and the …

Formal Model Driven Engineering

A Idani - 2023 - theses.hal.science
My research works are dedicated to the integration of two well known paradigms: Formal
Methods (FM) and Model-Driven Engineering (MDE). This integration is called Formal MDE …

Scalable GA processor architecture and its implementation of processor-element

T Imai, M Yoshikawa, H Terai… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
Genetic Algorithm (GA) is widely known as a general-purpose optimization method, which
can provide sub-optimum solutions for various. optimization problems by means of modeling …