Twenty years of rewriting logic

J Meseguer - The Journal of Logic and Algebraic Programming, 2012 - Elsevier
Rewriting logic is a simple computational logic that can naturally express both concurrent
computation and logical deduction with great generality. This paper provides a gentle …

Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies

SH Xuan, LK Tran, TK Dang… - … Conference on Advanced …, 2016 - ieeexplore.ieee.org
Attribute-based access control (ABAC) model manages access control through policies,
based on incoming requests in which attributes are basic elements for constructing those …

[HTML][HTML] A metamodel of access control for distributed environments: Applications and properties

C Bertolissi, M Fernández - Information and Computation, 2014 - Elsevier
We describe a metamodel for access control, designed to take into account the specific
requirements of distributed environments. We see a distributed system consisting of several …

Dynamic event-based access control as term rewriting

C Bertolissi, M Fernández, S Barker - IFIP Annual Conference on Data and …, 2007 - Springer
Despite the widespread adoption of Role-based Access Control (RBAC) models, new
access control models are required for new applications for which RBAC may not be …

Formal specification and verification of modular security policy based on colored Petri nets

H Huang, H Kirchner - IEEE Transactions on Dependable and …, 2010 - ieeexplore.ieee.org
Security policies are one of the most fundamental elements of computer security. Current
security policy design is concerned with the composition of components in security systems …

[HTML][HTML] A graph-based framework for the analysis of access control policies

S Alves, M Fernández - Theoretical Computer Science, 2017 - Elsevier
We design a graph-based framework for the analysis of access control policies that aims at
easing the specification and verification tasks for security administrators. We consider …

Security-driven model-based dynamic adaptation

B Morin, T Mouelhi, F Fleurey, Y Le Traon… - Proceedings of the 25th …, 2010 - dl.acm.org
Security is a key-challenge for software engineering, especially when considering access
control and software evolutions. No satisfying solution exists for maintaining the alignment of …

A rewriting framework for the composition of access control policies

C Bertolissi, M Fernández - Proceedings of the 10th international ACM …, 2008 - dl.acm.org
In large, and often distributed, environments, where access control information may be
shared across multiple sites, the combination of individual specifications in order to define a …

On the free precession candidate PSR B1828− 11: evidence for increasing deformation

G Ashton, DI Jones, R Prix - Monthly Notices of the Royal …, 2017 - academic.oup.com
We observe that the periodic variations in spin-down rate and beamwidth of the radio pulsar
PSR B1828− 11 are getting faster. In the context of a free precession model, this …

Modular access control via strategic rewriting

DJ Dougherty, C Kirchner, H Kirchner… - … –ESORICS 2007: 12th …, 2007 - Springer
Security policies, in particular access control, are fundamental elements of computer
security. We address the problem of authoring and analyzing policies in a modular way …