Verification and change-impact analysis of access-control policies
- 22 December 2005
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 17 references indexed in Scilit:
- Rigorous automated network security managementInternational Journal of Information Security, 2005
- Efficient comparison of enterprise privacy policiesPublished by Association for Computing Machinery (ACM) ,2004
- Policy management using access control spacesACM Transactions on Information and System Security, 2003
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- A lightweight approach to specification and analysis of role-based access control extensionsPublished by Association for Computing Machinery (ACM) ,2002
- On the specification and evolution of access control policiesPublished by Association for Computing Machinery (ACM) ,2001
- The role-based access control system of a European bankPublished by Association for Computing Machinery (ACM) ,2001
- Automating first-order relational logicPublished by Association for Computing Machinery (ACM) ,2000
- Isomorph-free model enumerationACM Transactions on Programming Languages and Systems, 1998
- Identifying the semantic and textual differences between two versions of a programPublished by Association for Computing Machinery (ACM) ,1990