Twenty years of rewriting logic

J Meseguer - The Journal of Logic and Algebraic Programming, 2012 - Elsevier
Rewriting logic is a simple computational logic that can naturally express both concurrent
computation and logical deduction with great generality. This paper provides a gentle …

[HTML][HTML] A metamodel of access control for distributed environments: Applications and properties

C Bertolissi, M Fernández - Information and Computation, 2014 - Elsevier
We describe a metamodel for access control, designed to take into account the specific
requirements of distributed environments. We see a distributed system consisting of several …

Formal specification and verification of modular security policy based on colored Petri nets

H Huang, H Kirchner - IEEE Transactions on Dependable and …, 2010 - ieeexplore.ieee.org
Security policies are one of the most fundamental elements of computer security. Current
security policy design is concerned with the composition of components in security systems …

A rewriting framework for the composition of access control policies

C Bertolissi, M Fernández - Proceedings of the 10th international ACM …, 2008 - dl.acm.org
In large, and often distributed, environments, where access control information may be
shared across multiple sites, the combination of individual specifications in order to define a …

Hipolds: A hierarchical security policy language for distributed systems

M Dell'Amico, G Serme, MS Idrees… - Information Security …, 2013 - Elsevier
Expressing security policies to govern distributed systems is a complex and error-prone task.
Policies are hard to understand, often expressed with unfriendly syntax, making it difficult for …

A framework for secure data collection and management for internet of things

M Fernández, M Kantarcioglu… - Proceedings of the 2nd …, 2016 - dl.acm.org
More and more current industrial control systems (eg, smart grids, oil and gas systems,
connected cars and trucks) have the capability to collect and transmit users' data in order to …

Réécriture et Modularité pour les Politiques de Sécurité

AS de Oliveira - 2008 - theses.hal.science
Dans cette thèse, nous nous intéressons à la spécification et à l'analyse modulaires de
politiques de sécurité flexibles basées sur des règles. Nous introduisons l'utilisation du …

Analysis of rewrite-based access control policies

C Kirchner, H Kirchner, AS de Oliveira - Electronic notes in theoretical …, 2009 - Elsevier
The rewrite-based approach provides executable specifications for security policies, which
can be independently designed, verified, and then anchored on programs using a modular …

A verified algorithm for detecting conflicts in XACML access control rules

M St-Martin, AP Felty - Proceedings of the 5th ACM SIGPLAN …, 2016 - dl.acm.org
We describe the formalization of a correctness proof for a conflict detection algorithm for
XACML (eXtensible Access Control Markup Language). XACML is a standardized …

Time and location based services with access control

C Bertolissi, M Fernández - 2008 New Technologies, Mobility …, 2008 - ieeexplore.ieee.org
We propose an access control model that extends RBAC (role-based access control) to take
time and location into account, and use term rewriting systems to specify access control …