Evaluating Access Control Policies Through Model Checking
- 1 January 2005
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 446-460
- https://doi.org/10.1007/11556992_32
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- Verification and change-impact analysis of access-control policiesPublished by Association for Computing Machinery (ACM) ,2005
- Synthesising verified access control systems in XACMLPublished by Association for Computing Machinery (ACM) ,2004
- Model-Checking Access Control PoliciesLecture Notes in Computer Science, 2004
- Static verification of security requirements in role based CSCW systemsPublished by Association for Computing Machinery (ACM) ,2003
- A lightweight approach to specification and analysis of role-based access control extensionsPublished by Association for Computing Machinery (ACM) ,2002
- Role-based access control modelsComputer, 1996