Dynamic access control policies: Specification and verification
Security requirements deal with the protection of assets against unauthorized access
(disclosure or modification) and their availability to authorized users. Temporal constraints of …
(disclosure or modification) and their availability to authorized users. Temporal constraints of …
[PDF][PDF] A policy-based management approach to security in cloud systems.
N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …
complexity, becoming more and more dynamic and distributed, often spanning across …
[PDF][PDF] Interval temporal logic
Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first-
order reasoning about periods of time found in descriptions of hardware and software …
order reasoning about periods of time found in descriptions of hardware and software …
Verification and enforcement of access control policies
Access control mechanisms protect critical resources of systems from unauthorized access.
In a policy-based management approach, administrators define user privileges as rules that …
In a policy-based management approach, administrators define user privileges as rules that …
A note on the formalisation of UCON
Usage Control (UCON) Models, similar to Access Control Models, control and govern the
users' access to resources and services that are available in the system. One of the major …
users' access to resources and services that are available in the system. One of the major …
Gaining access: attack and defense methods and legacy systems
K Stoddart - Cyberwarfare: Threats to critical infrastructure, 2022 - Springer
This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack
measures and then discusses counters and defenses. The attacks include the use of zero …
measures and then discusses counters and defenses. The attacks include the use of zero …
Concurrent enforcement of usage control policies
Policy-based approaches to the management of systems distinguish between the
specification of requirements, in the form of policies, and their enforcement on the system. In …
specification of requirements, in the form of policies, and their enforcement on the system. In …
Deriving enforcement mechanisms from policies
Policies provide a flexible and scalable approach to the management of distributed systems
by separating the specification of security requirements and their enforcement Over the …
by separating the specification of security requirements and their enforcement Over the …
Compositional reasoning using intervals and time reversal
B Moszkowski - Annals of Mathematics and Artificial Intelligence, 2014 - Springer
Abstract Interval Temporal Logic (ITL) is an established formalism for reasoning about time
periods. We investigate some simple kinds of ITL formulas which have application to …
periods. We investigate some simple kinds of ITL formulas which have application to …
Low-latency service data aggregation using policy obligations
S Reiff-Marganiec, M Tilly… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
The Internet of Things, large scale sensor networks or even in social media, are now well
established and their use is growing daily. Usage scenarios in these fields highlight the …
established and their use is growing daily. Usage scenarios in these fields highlight the …