<--- Back to Details
First PageDocument Content
Computer security / Security / Access control / Computer access control / XACML / Binary decision diagram / PERMIS / Information flow / Role-based access control / Policy analysis / Security-Enhanced Linux / Model checking
Date: 2005-04-29 09:42:28
Computer security
Security
Access control
Computer access control
XACML
Binary decision diagram
PERMIS
Information flow
Role-based access control
Policy analysis
Security-Enhanced Linux
Model checking

Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi

Add to Reading List

Source URL: web.cs.wpi.edu

Download Document from Source Website

File Size: 174,80 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Aircraft instruments / Standards / Covert channel / Steganography / ARINC 653 / ARINC / Verification / Human behavior / Technology / User interface design / Design

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

DocID: 1xV5v - View Document

Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

DocID: 1xUnb - View Document

arXiv:1608.01654v2 [cs.PL] 7 NovHypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf

DocID: 1xTMD - View Document

Metaphysics / Humanities / Terminology / Archaeological theory / Data collection / Evidence law / Museology / Provenance / Seeds / Causality / Inode / System call

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

DocID: 1xTBL - View Document