A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Traditional and hybrid access control models: a detailed survey

MU Aftab, A Hamza, A Oluwasanmi… - Security and …, 2022 - Wiley Online Library
Access control mechanisms define the level of access to the resources among specified
users. It distinguishes the users as authorized or unauthorized based on appropriate …

Scalable and precise automated analysis of administrative temporal role-based access control

S Ranise, A Truong, A Armando - … of the 19th ACM symposium on …, 2014 - dl.acm.org
Extensions of Role-Based Access Control (RBAC) policies taking into account contextual
information (such as time and space) are increasingly being adopted in real-world …

Security analysis of ABAC under an administrative model

S Jha, S Sural, V Atluri, J Vaidya - IET information security, 2019 - Wiley Online Library
In the present‐day computing environment, where access control decisions are often
dependent on contextual information like the location of the requesting user and the time of …

A security modeling and verification method of embedded software based on Z and MARTE

X Hu, Y Zhuang, F Zhang - Computers & Security, 2020 - Elsevier
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …

Vac - Verifier of Administrative Role-Based Access Control Policies

AL Ferrara, P Madhusudan, TL Nguyen… - … 2014, Held as Part of the …, 2014 - Springer
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …

A role-based administrative model for administration of heterogeneous access control policies and its security analysis

MP Singh, S Sural, J Vaidya, V Atluri - Information Systems Frontiers, 2021 - Springer
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …

Cree: A performant tool for safety analysis of administrative temporal role-based access control (ATRBAC) policies

J Shahen, J Niu, M Tripunitara - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Access control deals with the roles and privileges to which a user is authorized, and is an
important aspect of the security of a system. As enterprise access control systems need to …

An administrative model for collaborative management of ABAC systems and its security analysis

S Jha, S Sural, V Atluri, J Vaidya - 2016 IEEE 2nd International …, 2016 - ieeexplore.ieee.org
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …

Security analysis for temporal role based access control

E Uzun, V Atluri, J Vaidya, S Sural… - Journal of computer …, 2014 - content.iospress.com
Providing restrictive and secure access to resources is a challenging and socially important
problem. Among the many formal security models, Role Based Access Control (RBAC) has …