A formal role-based access control model for security policies in multi-domain mobile networks

D Unal, MU Çaglayan - Computer Networks, 2013 - Elsevier
Mobile users present challenges for security in multi-domain mobile networks. The actions of
mobile users moving across security domains need to be specified and checked against …

A decade of security research in ubiquitous computing: results of a systematic literature review

E Kusen, M Strembeck - International Journal of Pervasive Computing …, 2016 - emerald.com
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …

Privacy by ty** in the -calculus

D Kouzapas, A Philippou - Logical Methods in Computer …, 2017 - lmcs.episciences.org
In this paper we propose a formal framework for studying privacy in information systems. The
proposal follows a two-axes schema where the first axis considers privacy as a taxonomy of …

Types for role-based access control of dynamic web data

M Dezani-Ciancaglini, S Ghilezan, S Jakšić… - … and Constraint Logic …, 2011 - Springer
We introduce a role-based access control calculus for modelling dynamic web data and a
corresponding type system. It is an extension of the X dπ calculus proposed by Gardner and …

Type Checking Privacy Policies in the π-calculus

D Kouzapas, A Philippou - … Objects, Components, and Systems: 35th IFIP …, 2015 - Springer
In this paper we propose a formal framework for studying privacy. Our framework is based
on the π-calculus with groups accompanied by a type system for capturing privacy …

Spatiotemporal model checking of location and mobility related security policy specifications

D Ünal, MU Çağlayan - Turkish Journal of Electrical …, 2013 - journals.tubitak.gov.tr
For the formal verification of security in mobile networks, a requirement is that security
policies associated with mobility and location constraints are formally specified and verified …

[PDF][PDF] A Formal Modeling Scheme for Analyzing a Software System Design against the GDPR.

E Vanezi, GM Kapitsaki, D Kouzapas, A Philippou - ENASE, 2019 - scitepress.org
Since the adoption of the EU General Data Protection Regulation (GDPR) in May 2018,
designing software systems that conform to the GDPR principles has become vital. Modeling …

Type Checking Purpose-Based Privacy Policies in the-Calculus

E Kokkinofta, A Philippou - International Workshop on Web Services and …, 2014 - Springer
In this paper we propose a formal framework for studying privacy preserving policies based
on the notion of purpose. Our framework employs the π-calculus with groups accompanied …

[BOOK][B] Finding multi-step attacks in computer networks using heuristic search and mobile ambients

VNL Franqueira - 2009 - search.proquest.com
An important aspect of IT security governance is the proactive and continuous identification
of possible attacks in computer networks. This is complicated due to the complexity and size …

Model checking of location and mobility related security policy specifications in ambient calculus

D Unal, O Akar, M Ufuk Caglayan - … Network Security, MMM-ACNS 2010, St …, 2010 - Springer
Verification of security for mobile networks requires specification and verification of security
policies in multiple-domain environments. Mobile users present challenges for specification …