A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
Traditional and hybrid access control models: a detailed survey
MU Aftab, A Hamza, A Oluwasanmi… - Security and …, 2022 - Wiley Online Library
Access control mechanisms define the level of access to the resources among specified
users. It distinguishes the users as authorized or unauthorized based on appropriate …
users. It distinguishes the users as authorized or unauthorized based on appropriate …
Scalable and precise automated analysis of administrative temporal role-based access control
Extensions of Role-Based Access Control (RBAC) policies taking into account contextual
information (such as time and space) are increasingly being adopted in real-world …
information (such as time and space) are increasingly being adopted in real-world …
Security analysis of ABAC under an administrative model
In the present‐day computing environment, where access control decisions are often
dependent on contextual information like the location of the requesting user and the time of …
dependent on contextual information like the location of the requesting user and the time of …
A security modeling and verification method of embedded software based on Z and MARTE
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …
towards the increasingly prominent security requirements. In this paper, aiming at high …
Vac - Verifier of Administrative Role-Based Access Control Policies
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
A role-based administrative model for administration of heterogeneous access control policies and its security analysis
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …
enforcement of flexible and dynamic access control policies using traditional access control …
Cree: A performant tool for safety analysis of administrative temporal role-based access control (ATRBAC) policies
Access control deals with the roles and privileges to which a user is authorized, and is an
important aspect of the security of a system. As enterprise access control systems need to …
important aspect of the security of a system. As enterprise access control systems need to …
An administrative model for collaborative management of ABAC systems and its security analysis
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …
and federated enterprises due to its flexibility in expressing various types of security policies …
Security analysis for temporal role based access control
Providing restrictive and secure access to resources is a challenging and socially important
problem. Among the many formal security models, Role Based Access Control (RBAC) has …
problem. Among the many formal security models, Role Based Access Control (RBAC) has …