2014
DOI: 10.5815/ijcnis.2015.01.08
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Comparison of Access Control Policies Validation Mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 46 publications
0
13
0
Order By: Relevance
“…An undefined request in fact leads to a problem since its evaluation leads to multiple incompatible replies. This definition is stricter than satisfiability and covers the usual notion of conflicts we found for instance in security policies [25,6]. This has two simple consequences: i) any useful system has undefined requests and ii) these undefined requests are included in 1≤i≤n D i .…”
Section: Definition 3 (Undefined Requests)mentioning
confidence: 96%
See 2 more Smart Citations
“…An undefined request in fact leads to a problem since its evaluation leads to multiple incompatible replies. This definition is stricter than satisfiability and covers the usual notion of conflicts we found for instance in security policies [25,6]. This has two simple consequences: i) any useful system has undefined requests and ii) these undefined requests are included in 1≤i≤n D i .…”
Section: Definition 3 (Undefined Requests)mentioning
confidence: 96%
“…There are already several verification methods and algorithms for rule-based policies, in expert systems and databases [2], for Web policies and contracts [3], and in the security domain [4,5,6]. In this paper we will focus on formal methods and assume a formal policy written in a decidable logic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A brief comparison of the model checking tools we considered. A more complete treatment can be found in the work of Aqib and Shaikh [27].…”
Section: Verification and Validationmentioning
confidence: 99%
“…A brief summary of the tools or approaches based on model checking is given in Table 8. We refer the readers to Aqib and Shaikh [27] for a detailed survey of verification and validation tools and approaches for access control policies.…”
Section: T-way Combination Tests: a Policy Developermentioning
confidence: 99%