Automatic error finding in access-control policies

K Jayaraman, V Ganesh, M Tripunitara… - Proceedings of the 18th …, 2011 - dl.acm.org
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies

K Jayaraman, M Tripunitara, V Ganesh… - ACM Transactions on …, 2013 - dl.acm.org
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …

Satisfiability analysis of workflows with control-flow patterns and authorization constraints

P Yang, X Xie, I Ray, S Lu - IEEE Transactions on Services …, 2013 - ieeexplore.ieee.org
Workflow security has become increasingly important and challenging in today's open
service world. While much research has been conducted on various security issues of …

ASASP: automated symbolic analysis of security policies

F Alberti, A Armando, S Ranise - … , Wrocław, Poland, July 31-August 5 …, 2011 - Springer
We describe asasp, a symbolic reachability procedure for the analysis of administrative
access control policies. The tool represents access policies and their administrative actions …

Policy analysis for administrative role based access control without separate administration

P Yang, MI Gofman, SD Stoller… - Journal of Computer …, 2015 - content.iospress.com
Role based access control (RBAC) is a widely used approach to access control with well-
known advantages in managing authorization policies. This paper considers user-role …

Incremental analysis of evolving administrative role based access control policies

S Ranise, A Truong - Data and Applications Security and Privacy XXVIII …, 2014 - Springer
We consider the safety problem for Administrative Role-Based Access Control (ARBAC)
policies, ie detecting whether sequences of administrative actions can result in policies by …

Compositional typed analysis of ARBAC policies

S Calzavara, A Rabitti, M Bugliesi - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …

Analysis of scientific workflow provenance access control policies

R Luo, P Yang, S Lu, M Gofman - 2012 IEEE Ninth …, 2012 - ieeexplore.ieee.org
Provenance has become an important concept for services computing in general, and for
scientific workflows in particular. Provenance often contains confidential data and …

Parameterized model checking for security policy analysis

S Ranise, A Truong, R Traverso - International Journal on Software Tools …, 2016 - Springer
We explain how a parameterized model checking technique can be exploited to mechanize
the analysis of access control policies. The main advantage of the approach is to reason …