[PDF][PDF] Automated analysis and debugging of network connectivity policies

K Jayaraman, N Bjørner, G Outhred, C Kaufman - Microsoft Research, 2014 - microsoft.com
Network connectivity policies are crucial for assuring the security and availability of large-
scale datacenter. Managing these policies is fraught with complexity and operator errors …

Safety decidability for pre-authorization usage control with identifier attribute domains

PV Rajkumar, R Sandhu - IEEE Transactions on Dependable …, 2018 - ieeexplore.ieee.org
Safety analysis is a fundamental problem in authorization models. Safety decidable models
provide theoretical foundations for decentralized security administration. Attributes of objects …

Safety decidability for pre-authorization usage control with finite attribute domains

PV Rajkumar, R Sandhu - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
This paper considers the safety problem for the pre-authorization sub-model of the well-
known usage control model, that is,. It is shown that with finite attribute domains has …

Analyzing temporal role based access control models

E Uzun, V Atluri, S Sural, J Vaidya, G Parlato… - Proceedings of the 17th …, 2012 - dl.acm.org
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access
control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies

K Jayaraman, M Tripunitara, V Ganesh… - ACM Transactions on …, 2013 - dl.acm.org
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …

Policy analysis for self-administrated role-based access control

AL Ferrara, P Madhusudan, G Parlato - … , TACAS 2013, Held as Part of the …, 2013 - Springer
Current techniques for security analysis of administrative role-based access control
(ARBAC) policies restrict themselves to the separate administration assumption that …

A security modeling and verification method of embedded software based on Z and MARTE

X Hu, Y Zhuang, F Zhang - Computers & Security, 2020 - Elsevier
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …

Vac - Verifier of Administrative Role-Based Access Control Policies

AL Ferrara, P Madhusudan, TL Nguyen… - … 2014, Held as Part of the …, 2014 - Springer
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …

A role-based administrative model for administration of heterogeneous access control policies and its security analysis

MP Singh, S Sural, J Vaidya, V Atluri - Information Systems Frontiers, 2021 - Springer
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …