[PDF][PDF] Automated analysis and debugging of network connectivity policies
K Jayaraman, N Bjørner, G Outhred, C Kaufman - Microsoft Research, 2014 - microsoft.com
Network connectivity policies are crucial for assuring the security and availability of large-
scale datacenter. Managing these policies is fraught with complexity and operator errors …
scale datacenter. Managing these policies is fraught with complexity and operator errors …
Safety decidability for pre-authorization usage control with identifier attribute domains
PV Rajkumar, R Sandhu - IEEE Transactions on Dependable …, 2018 - ieeexplore.ieee.org
Safety analysis is a fundamental problem in authorization models. Safety decidable models
provide theoretical foundations for decentralized security administration. Attributes of objects …
provide theoretical foundations for decentralized security administration. Attributes of objects …
Safety decidability for pre-authorization usage control with finite attribute domains
PV Rajkumar, R Sandhu - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
This paper considers the safety problem for the pre-authorization sub-model of the well-
known usage control model, that is,. It is shown that with finite attribute domains has …
known usage control model, that is,. It is shown that with finite attribute domains has …
Analyzing temporal role based access control models
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access
control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the …
control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …
an important problem in security. Enterprise access-control systems have grown to protect …
Policy analysis for self-administrated role-based access control
Current techniques for security analysis of administrative role-based access control
(ARBAC) policies restrict themselves to the separate administration assumption that …
(ARBAC) policies restrict themselves to the separate administration assumption that …
A security modeling and verification method of embedded software based on Z and MARTE
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …
towards the increasingly prominent security requirements. In this paper, aiming at high …
Vac - Verifier of Administrative Role-Based Access Control Policies
In this paper we present Vac, an automatic tool for verifying security properties of
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
administrative Role-based Access Control (RBAC). RBAC has become an increasingly …
A role-based administrative model for administration of heterogeneous access control policies and its security analysis
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …
enforcement of flexible and dynamic access control policies using traditional access control …