A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

Edit automata: Enforcement mechanisms for run-time security policies

J Ligatti, L Bauer, D Walker - International Journal of Information Security, 2005 - Springer
We analyze the space of security policies that can be enforced by monitoring and modifying
programs at run time. Our program monitors, called edit automata, are abstract machines …

A privacy preservation model for facebook-style social network systems

PWL Fong, M Anwar, Z Zhao - … : 14th European Symposium on Research in …, 2009 - Springer
Recent years have seen unprecedented growth in the popularity of social network systems,
with Facebook being an archetypical example. The access control paradigm behind the …

What can you verify and enforce at runtime?

Y Falcone, JC Fernandez, L Mounier - International Journal on Software …, 2012 - Springer
The underlying property, its definition, and representation play a major role when monitoring
a system. Having a suitable and convenient framework to express properties is thus a …

Run-time enforcement of nonsafety policies

J Ligatti, L Bauer, D Walker - ACM Transactions on Information and …, 2009 - dl.acm.org
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …

Computability classes for enforcement mechanisms

KW Hamlen, G Morrisett, FB Schneider - ACM Transactions on …, 2006 - dl.acm.org
A precise characterization of those security policies enforceable by program rewriting is
given. This also exposes and rectifies problems in prior work, yielding a better …

Runtime enforcement monitors: composition, synthesis, and enforcement abilities

Y Falcone, L Mounier, JC Fernandez… - Formal Methods in System …, 2011 - Springer
Runtime enforcement is a powerful technique to ensure that a program will respect a given
set of properties. We extend previous work on this topic in several directions. Firstly, we …

A comprehensive approach to the automatic refinement and verification of access control policies

M Cheminod, L Durante, L Seno, F Valenza… - Computers & …, 2019 - Elsevier
Access control is one of the building blocks of network security and is often managed by
network administrators through the definition of sets of high-level policies meant to regulate …

Relationship-based access control policies and their policy languages

PWL Fong, I Siahaan - Proceedings of the 16th ACM symposium on …, 2011 - dl.acm.org
The Relationship-Based Access Control (ReBAC) model was recently proposed as a
general-purpose access control model. It supports the natural expression of parameterized …

You should better enforce than verify

Y Falcone - International Conference on Runtime Verification, 2010 - Springer
This tutorial deals with runtime enforcement and advocates its use as an extension of
runtime verification. While research efforts in runtime verification have been mainly …