Dynamic access control policies: Specification and verification

H Janicke, A Cau, F Siewe, H Zedan - The Computer Journal, 2013 - academic.oup.com
Security requirements deal with the protection of assets against unauthorized access
(disclosure or modification) and their availability to authorized users. Temporal constraints of …

[PDF][PDF] A policy-based management approach to security in cloud systems.

N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …

[PDF][PDF] Interval temporal logic

A Cau, B Moszkowski, H Zedan - URL: http://www. cms. dmu. ac …, 2006 - antonio-cau.co.uk
Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first-
order reasoning about periods of time found in descriptions of hardware and software …

Verification and enforcement of access control policies

A Cau, H Janicke, B Moszkowski - Formal Methods in System Design, 2013 - Springer
Access control mechanisms protect critical resources of systems from unauthorized access.
In a policy-based management approach, administrators define user privileges as rules that …

A note on the formalisation of UCON

H Janicke, A Cau, H Zedan - Proceedings of the 12th ACM symposium …, 2007 - dl.acm.org
Usage Control (UCON) Models, similar to Access Control Models, control and govern the
users' access to resources and services that are available in the system. One of the major …

Gaining access: attack and defense methods and legacy systems

K Stoddart - Cyberwarfare: Threats to critical infrastructure, 2022 - Springer
This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack
measures and then discusses counters and defenses. The attacks include the use of zero …

Concurrent enforcement of usage control policies

H Janicke, A Cau, F Siewe… - 2008 IEEE Workshop on …, 2008 - ieeexplore.ieee.org
Policy-based approaches to the management of systems distinguish between the
specification of requirements, in the form of policies, and their enforcement on the system. In …

Deriving enforcement mechanisms from policies

H Janicke, A Cau, F Siewe… - Eighth IEEE International …, 2007 - ieeexplore.ieee.org
Policies provide a flexible and scalable approach to the management of distributed systems
by separating the specification of security requirements and their enforcement Over the …

Compositional reasoning using intervals and time reversal

B Moszkowski - Annals of Mathematics and Artificial Intelligence, 2014 - Springer
Abstract Interval Temporal Logic (ITL) is an established formalism for reasoning about time
periods. We investigate some simple kinds of ITL formulas which have application to …

Low-latency service data aggregation using policy obligations

S Reiff-Marganiec, M Tilly… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
The Internet of Things, large scale sensor networks or even in social media, are now well
established and their use is growing daily. Usage scenarios in these fields highlight the …