Modularisation in Maude of parametrized rbac for row level access control

Ś Sobieski, B Zieliński - East European Conference on Advances in …, 2011 - Springer
Abstract We formalize a Parametrized Role-Based Access Control in the language Maude.
We demonstrate how this formalization can be used to specify a row level access control …

Tree automata based semantics of firewalls

T Bourdier - 2011 Conference on Network and Information …, 2011 - ieeexplore.ieee.org
Security constitutes a crucial concern in modern information systems. Several aspects are
involved, such as user authentication (establishing and verifying users' identity), cryptology …

Constrained rewriting in recognizable theories

T Bourdier, H Cirstea - 2010 - inria.hal.science
Rewriting has long been shown useful for equational reasoning but its expressive power is
not always appropriate for certain situations, as for instance for specifying partial functions …

Flexible Workflows for Digital Design in the Nano Era

M Minor, A Koldehoff, D Schmalen… - 15th IEEE International …, 2006 - ieeexplore.ieee.org
This paper presents work in progress on an adaptive workflow management tool for digital
design projects. The chip design follows standardized default processes which are adapted …

Méthodes algébriques pour la formalisation et l'analyse de politiques de sécurité

T Bourdier - 2011 - theses.hal.science
Concevoir et mettre en œuvre des méthodes pour la spécification, l'analyse et la vérification
de logiciels et de systèmes sont les principaux moteurs des activités de recherche …

Notice of Violation of IEEE Publication Principles: A Formal Framework for Security Policy Specification and Implementation

W Yigong, Z Hongqi, D Xiangdong… - … Conference on Network …, 2011 - ieeexplore.ieee.org
Notice of Violation of IEEE Publication Principles" A Formal Framework for Security Policy
Specification and Implementation" by Wang Yigong, Zhang Hongqi, Dai Xiangdong, and Liu …

[PDF][PDF] Automatic analysis of firewalls using tree automata

T Bourdier - researchgate.net
Since the late 80s, firewalls are at the heart of network security. First designed to enable
private networks to be opened up to the outside in a secure way, the growing complexity of …

[引用][C] Rule Based Specification of Security Policies

T Bourdier, H Cirstea, C Hurlin, H Kirchner