Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…Concerning the verification of the security rules, several researches tended to concentrate their efforts on the verification of security rules in order to detect errors, attacks or misconfigurations, such as redundancy, contradictions or collisions [4,5,6,14,15,16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Concerning the verification of the security rules, several researches tended to concentrate their efforts on the verification of security rules in order to detect errors, attacks or misconfigurations, such as redundancy, contradictions or collisions [4,5,6,14,15,16].…”
Section: Related Workmentioning
confidence: 99%
“…Other approaches propose to focus on validation by checking the conformance of a system with respect to a security policy. In [15], authors provide a solution to verify the security policies modeled with the RBAC model in cloud systems. They have firstly designed a set of properties related to this environment and used a model checking technique to verify the correctness of the deployed policies.…”
Section: Related Workmentioning
confidence: 99%
“…However, calculations in the cloud are associated with losing the control over sent computational models. Due to this, methods for verification and protection of data transferred to the computational cloud are under development at present (Fernandes et al, 2014;Gouglidis et al, 2014).…”
Section: Generator Of Computational Models With Use Of Remote Startinmentioning
confidence: 99%
“…New computing paradigms, e.g., the cloud [2], require further investigation of access control systems. This eventually introduces the need for models, such as usage control [3], to cope with complex highlevel requirements set by new computing paradigms.Usage control models provide an integration of access control, digital rights, and trust management, which may be applicable in environments such as the cloud.…”
Section: Introductionmentioning
confidence: 99%