Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
Business process modelling challenges and solutions: a literature review
Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
MulVAL: A logic-based network security analyzer.
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …
must consider interactions among multiple network elements. For a vulnerability analysis …
Understanding android security
Google's Android platform is a widely anticipated open source operating system for mobile
phones. This article describes Android's security model and attempts to unmask the …
phones. This article describes Android's security model and attempts to unmask the …
Semantic-based automated reasoning for AWS access policies using SMT
J Backes, P Bolignano, B Cook… - … Formal Methods in …, 2018 - ieeexplore.ieee.org
Cloud computing provides on-demand access to IT resources via the Internet. Permissions
for these resources are defined by expressive access control policies. This paper presents a …
for these resources are defined by expressive access control policies. This paper presents a …
Design of a role-based trust-management framework
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …
representing policies and credentials in distributed authorization. RT combines the strengths …
Relationship-based access control: protection model and policy language
PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …
approaches to access control. Gates coined the term Relationship-Based Access Control …
Distributed credential chain discovery in trust management
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …
trust-management language introduced in this paper. The algorithms search credential …
Declarative networking
Declarative Networking is a programming methodology that enables developers to concisely
specify network protocols and services, which are directly compiled to a dataflow framework …
specify network protocols and services, which are directly compiled to a dataflow framework …
Datalog with Constraints: A Foundation for Trust Management Languages
Trust management (TM) is a promising approach for authorization and access control in
distributed systems, based on signed distributed policy statements expressed in a policy …
distributed systems, based on signed distributed policy statements expressed in a policy …