A formal role-based access control model for security policies in multi-domain mobile networks
Mobile users present challenges for security in multi-domain mobile networks. The actions of
mobile users moving across security domains need to be specified and checked against …
mobile users moving across security domains need to be specified and checked against …
A decade of security research in ubiquitous computing: results of a systematic literature review
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …
there has been a general interest in proposing various solutions that would support his …
Privacy by ty** in the -calculus
In this paper we propose a formal framework for studying privacy in information systems. The
proposal follows a two-axes schema where the first axis considers privacy as a taxonomy of …
proposal follows a two-axes schema where the first axis considers privacy as a taxonomy of …
Types for role-based access control of dynamic web data
We introduce a role-based access control calculus for modelling dynamic web data and a
corresponding type system. It is an extension of the X dπ calculus proposed by Gardner and …
corresponding type system. It is an extension of the X dπ calculus proposed by Gardner and …
Type Checking Privacy Policies in the π-calculus
In this paper we propose a formal framework for studying privacy. Our framework is based
on the π-calculus with groups accompanied by a type system for capturing privacy …
on the π-calculus with groups accompanied by a type system for capturing privacy …
Spatiotemporal model checking of location and mobility related security policy specifications
For the formal verification of security in mobile networks, a requirement is that security
policies associated with mobility and location constraints are formally specified and verified …
policies associated with mobility and location constraints are formally specified and verified …
[PDF][PDF] A Formal Modeling Scheme for Analyzing a Software System Design against the GDPR.
Since the adoption of the EU General Data Protection Regulation (GDPR) in May 2018,
designing software systems that conform to the GDPR principles has become vital. Modeling …
designing software systems that conform to the GDPR principles has become vital. Modeling …
Type Checking Purpose-Based Privacy Policies in the-Calculus
E Kokkinofta, A Philippou - International Workshop on Web Services and …, 2014 - Springer
In this paper we propose a formal framework for studying privacy preserving policies based
on the notion of purpose. Our framework employs the π-calculus with groups accompanied …
on the notion of purpose. Our framework employs the π-calculus with groups accompanied …
[BOOK][B] Finding multi-step attacks in computer networks using heuristic search and mobile ambients
VNL Franqueira - 2009 - search.proquest.com
An important aspect of IT security governance is the proactive and continuous identification
of possible attacks in computer networks. This is complicated due to the complexity and size …
of possible attacks in computer networks. This is complicated due to the complexity and size …
Model checking of location and mobility related security policy specifications in ambient calculus
Verification of security for mobile networks requires specification and verification of security
policies in multiple-domain environments. Mobile users present challenges for specification …
policies in multiple-domain environments. Mobile users present challenges for specification …