Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

Business process modelling challenges and solutions: a literature review

Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …

MulVAL: A logic-based network security analyzer.

X Ou, S Govindavajhala, AW Appel - USENIX security symposium, 2005 - usenix.org
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …

Understanding android security

W Enck, M Ongtang, P McDaniel - IEEE security & privacy, 2009 - ieeexplore.ieee.org
Google's Android platform is a widely anticipated open source operating system for mobile
phones. This article describes Android's security model and attempts to unmask the …

Semantic-based automated reasoning for AWS access policies using SMT

J Backes, P Bolignano, B Cook… - … Formal Methods in …, 2018 - ieeexplore.ieee.org
Cloud computing provides on-demand access to IT resources via the Internet. Permissions
for these resources are defined by expressive access control policies. This paper presents a …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …

Declarative networking

BT Loo, T Condie, M Garofalakis, DE Gay… - Communications of the …, 2009 - dl.acm.org
Declarative Networking is a programming methodology that enables developers to concisely
specify network protocols and services, which are directly compiled to a dataflow framework …

Datalog with Constraints: A Foundation for Trust Management Languages

N Li, JC Mitchell - Practical Aspects of Declarative Languages: 5th …, 2003 - Springer
Trust management (TM) is a promising approach for authorization and access control in
distributed systems, based on signed distributed policy statements expressed in a policy …