A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

IFCIL: An Information Flow Configuration Language for SELinux

L Ceragioli, L Galletta, P Degano… - 2022 IEEE 35th …, 2022 - ieeexplore.ieee.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
mandatory access control. It has been used in numerous security-critical contexts ranging …

Specifying and verifying information flow control in SELinux configurations

L Ceragioli, L Galletta, P Degano, D Basin - ACM Transactions on …, 2024 - dl.acm.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
Mandatory Access Control. It has been used in numerous security-critical contexts ranging …

WatchIT: Who watches your IT guy?

N Shalev, I Keidar, Y Weinsberg, Y Moatti… - Proceedings of the 26th …, 2017 - dl.acm.org
System administrators have unlimited access to system resources. As the Snowden case
highlighted, these permissions can be exploited to steal valuable personal, classified, or …

Simulated penetration testing and mitigation analysis

P Speicher - 2022 - publikationen.sulb.uni-saarland.de
As corporate networks and Internet services are becoming increasingly more complex, it is
hard to keep an overview over all deployed software, their potential vulnerabilities, and all …

Compositional typed analysis of ARBAC policies

S Calzavara, A Rabitti, M Bugliesi - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …

IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)

L Ceragioli, L Galletta, P Degano, D Basin - arXiv preprint arXiv …, 2022 - arxiv.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
mandatory access control. It has been used in numerous security-critical contexts ranging …

LRBAC: Flexible function-level hierarchical role based access control for Linux

J Zandi, A Naderi-Afooshteh - 2015 12th International Iranian …, 2015 - ieeexplore.ieee.org
We present a flexible hierarchical role based access control model based on simple and
existing technologies that enables efficient function-level access control, prototyped in a …

LogicDetect: Real-Time Detection of Faults in Access Control Policy with Logic Circuits

Y Dubasi, V Hu, Q Li, J Di - Available at SSRN 4904892, 2024 - papers.ssrn.com
Ensuring the correctness of access control (AC) policies is crucial for system security,
particularly for complex systems with numerous subjects, objects, roles, and actions …