<--- Back to Details
First PageDocument Content
Computer security / Security / Access control / Computer access control / XACML / Binary decision diagram / PERMIS / Information flow / Role-based access control / Policy analysis / Security-Enhanced Linux / Model checking
Date: 2005-04-29 09:42:28
Computer security
Security
Access control
Computer access control
XACML
Binary decision diagram
PERMIS
Information flow
Role-based access control
Policy analysis
Security-Enhanced Linux
Model checking

Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi

Add to Reading List

Source URL: web.cs.wpi.edu

Download Document from Source Website

File Size: 174,80 KB

Share Document on Facebook

Similar Documents

Název projektu: Analýza přístupových oprávnění a jejich převod na RBAC (Role Based Access Control) model Vedení projektu: Antonín Beneš

DocID: 1v0fH - View Document

Computer security / Security / Access control / Computer access control / XACML / PERMIS / Identity management / Role-based access control / Authorization / Model-driven security / PDP / Toolchain

A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

DocID: 1rlqO - View Document

Computing / Microsoft / Ls / Email / Role-based access control / Zip / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

DocID: 1qMQy - View Document

Computing / Microsoft / Ls / Zip / Email / Role-based access control / Counterpoint / Outlook.com

COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

DocID: 1qFmx - View Document