A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
IFCIL: An Information Flow Configuration Language for SELinux
L Ceragioli, L Galletta, P Degano… - 2022 IEEE 35th …, 2022 - ieeexplore.ieee.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
mandatory access control. It has been used in numerous security-critical contexts ranging …
mandatory access control. It has been used in numerous security-critical contexts ranging …
Specifying and verifying information flow control in SELinux configurations
L Ceragioli, L Galletta, P Degano, D Basin - ACM Transactions on …, 2024 - dl.acm.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
Mandatory Access Control. It has been used in numerous security-critical contexts ranging …
Mandatory Access Control. It has been used in numerous security-critical contexts ranging …
WatchIT: Who watches your IT guy?
System administrators have unlimited access to system resources. As the Snowden case
highlighted, these permissions can be exploited to steal valuable personal, classified, or …
highlighted, these permissions can be exploited to steal valuable personal, classified, or …
Simulated penetration testing and mitigation analysis
P Speicher - 2022 - publikationen.sulb.uni-saarland.de
As corporate networks and Internet services are becoming increasingly more complex, it is
hard to keep an overview over all deployed software, their potential vulnerabilities, and all …
hard to keep an overview over all deployed software, their potential vulnerabilities, and all …
Compositional typed analysis of ARBAC policies
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …
effectiveness is hindered by the exponential explosion of the ways in which different users …
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)
L Ceragioli, L Galletta, P Degano, D Basin - arXiv preprint arXiv …, 2022 - arxiv.org
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing
mandatory access control. It has been used in numerous security-critical contexts ranging …
mandatory access control. It has been used in numerous security-critical contexts ranging …
LRBAC: Flexible function-level hierarchical role based access control for Linux
J Zandi, A Naderi-Afooshteh - 2015 12th International Iranian …, 2015 - ieeexplore.ieee.org
We present a flexible hierarchical role based access control model based on simple and
existing technologies that enables efficient function-level access control, prototyped in a …
existing technologies that enables efficient function-level access control, prototyped in a …
LogicDetect: Real-Time Detection of Faults in Access Control Policy with Logic Circuits
Ensuring the correctness of access control (AC) policies is crucial for system security,
particularly for complex systems with numerous subjects, objects, roles, and actions …
particularly for complex systems with numerous subjects, objects, roles, and actions …