Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Modeling contextual security policies

F Cuppens, N Cuppens-Boulahia - International Journal of Information …, 2008 - Springer
As computer infrastructures become more complex, security models must provide means to
handle more flexible and dynamic requirements. In the Organization Based Access Control …

Relationship-based access control for online social networks: Beyond user-to-user relationships

Y Cheng, J Park, R Sandhu - … Security, Risk and Trust and 2012 …, 2012 - ieeexplore.ieee.org
User-to-user (U2U) relationship-based access control has become the most prevalent
approach for modeling access control in online social networks (OSNs), where authorization …

Pacifista: Conflict evaluation and management in open ran

PB del Prever, S D'Oro, L Bonati, M Polese… - arxiv preprint arxiv …, 2024 - arxiv.org
The O-RAN ALLIANCE is defining architectures, interfaces, operations, and security
requirements for cellular networks based on Open Radio Access Network (RAN) principles …

Diplomat: Using delegations to protect community repositories

TK Kuppusamy, S Torres-Arias, V Diaz… - 13th USENIX Symposium …, 2016 - usenix.org
Community repositories, such as Docker Hub, PyPI, and RubyGems, are bustling
marketplaces that distribute software. Even though these repositories use common software …

Challenges in ehealth: From enabling to enforcing privacy

N Dong, H Jonker, J Pang - … of Health Informatics Engineering and Systems, 2011 - Springer
Privacy is recognised as a fundamental requirement for eHealth systems. Proposals to
achieve privacy have been put forth in literature, most of which approach patient privacy as …

A data classification method for inconsistency and incompleteness detection in access control policy sets

RA Shaikh, K Adi, L Logrippo - International Journal of Information …, 2017 - Springer
Access control policies may contain anomalies such as incompleteness and inconsistency,
which can result in security vulnerabilities. Detecting such anomalies in large sets of …

Testing security policies: going beyond functional testing

Y Le Traon, T Mouelhi, B Baudry - The 18th IEEE International …, 2007 - ieeexplore.ieee.org
While important efforts are dedicated to system functional testing, very few works study how
to test specifically security mechanisms, implementing a security policy. This paper …

An optimized approach for assisted firewall anomaly resolution

D Bringhenti, L Seno, F Valenza - IEEE Access, 2023 - ieeexplore.ieee.org
The security configuration of firewalls is a complex task that is commonly performed
manually by network administrators. As a consequence, among the rules composing firewall …

Nomad: A security model with non atomic actions and deadlines

F Cuppens, N Cuppens-Boulahia… - 18th IEEE Computer …, 2005 - ieeexplore.ieee.org
Modelling security policies requires means to specify permissions and prohibitions.
However, this is generally not sufficient to express security properties such as availability …