Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …
an important problem in security. Enterprise access-control systems have grown to protect …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …
an important problem in security. Enterprise access-control systems have grown to protect …
Satisfiability analysis of workflows with control-flow patterns and authorization constraints
Workflow security has become increasingly important and challenging in today's open
service world. While much research has been conducted on various security issues of …
service world. While much research has been conducted on various security issues of …
ASASP: automated symbolic analysis of security policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative
access control policies. The tool represents access policies and their administrative actions …
access control policies. The tool represents access policies and their administrative actions …
Policy analysis for administrative role based access control without separate administration
P Yang, MI Gofman, SD Stoller… - Journal of Computer …, 2015 - content.iospress.com
Role based access control (RBAC) is a widely used approach to access control with well-
known advantages in managing authorization policies. This paper considers user-role …
known advantages in managing authorization policies. This paper considers user-role …
Incremental analysis of evolving administrative role based access control policies
We consider the safety problem for Administrative Role-Based Access Control (ARBAC)
policies, ie detecting whether sequences of administrative actions can result in policies by …
policies, ie detecting whether sequences of administrative actions can result in policies by …
Compositional typed analysis of ARBAC policies
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …
effectiveness is hindered by the exponential explosion of the ways in which different users …
Analysis of scientific workflow provenance access control policies
Provenance has become an important concept for services computing in general, and for
scientific workflows in particular. Provenance often contains confidential data and …
scientific workflows in particular. Provenance often contains confidential data and …
Parameterized model checking for security policy analysis
We explain how a parameterized model checking technique can be exploited to mechanize
the analysis of access control policies. The main advantage of the approach is to reason …
the analysis of access control policies. The main advantage of the approach is to reason …