Analysis of XACML policies with SMT

F Turkmen, J Den Hartog, S Ranise… - … 2015, Held as Part of the …, 2015 - Springer
Abstract The eXtensible Access Control Markup Language (XACML) is an extensible and
flexible XML language for the specification of access control policies. However, the richness …

Formal analysis of XACML policies using SMT

F Turkmen, J den Hartog, S Ranise, N Zannone - Computers & Security, 2017 - Elsevier
Abstract The eXtensible Access Control Markup Language (XACML) has attracted
significant attention from both industry and academia, and has become the de facto standard …

A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

[HTML][HTML] The logic of XACML

CDPK Ramli, HR Nielson, F Nielson - Science of Computer Programming, 2014 - Elsevier
We study the international standard XACML 3.0 for describing security access control
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …

Monitoring compliance policies over incomplete and disagreeing logs

D Basin, F Klaedtke, S Marinovic… - Runtime Verification: Third …, 2013 - Springer
When monitoring system behavior to check compliance against a given policy, one is
sometimes confronted with incomplete knowledge about system events. In IT systems, such …

120 Domain-Specific Languages for Security

M Krausz, S Peldszus, F Regazzoni, T Berger… - arxiv preprint arxiv …, 2024 - arxiv.org
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …

JACPoL: a simple but expressive JSON-based access control policy language

H Jiang, A Bouabdallah - Information Security Theory and Practice: 11th …, 2018 - Springer
Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT and
5G have emerged and brought out the need for protecting shared resources and services …

Analyzing XACML policies using answer set programming

M Rezvani, D Rajaratnam, A Ignjatovic… - International Journal of …, 2019 - Springer
With the tremendous growth of Web applications and services, eXtensible Access Control
Markup Language (XACML) has been broadly adopted to specify Web access control …

Sophisticated access control via SMT and logical frameworks

K Arkoudas, R Chadha, J Chiang - ACM Transactions on Information and …, 2014 - dl.acm.org
We introduce a new methodology for formulating, analyzing, and applying access-control
policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …

Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules

JA Ruiz, P Narendran, A Masoumzadeh… - Proceedings of the 29th …, 2024 - dl.acm.org
Using access control policy rules with deny effects (ie, negative authorization) can be
preferred to using complemented conditions in the rules as they are often easier to …