2009
DOI: 10.1016/j.entcs.2009.02.072
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Rewrite-Based Access Control Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(27 citation statements)
references
References 17 publications
0
27
0
Order By: Relevance
“…Our approach combines the use of a visual graph formalism to represent a concrete state of the system, and the use of rewrite rules to model the dynamics of the system. In [37], it is shown how narrowing can be used to solve administrator queries of the form "what if a request is made under these conditions? ", by representing a query as a pair of a term and a firstorder equational constraint.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Our approach combines the use of a visual graph formalism to represent a concrete state of the system, and the use of rewrite rules to model the dynamics of the system. In [37], it is shown how narrowing can be used to solve administrator queries of the form "what if a request is made under these conditions? ", by representing a query as a pair of a term and a firstorder equational constraint.…”
Section: Related Workmentioning
confidence: 99%
“…Another related approach uses term rewrite rules to model particular access control models, relying on the power of term rewriting systems to express general dynamic access control policies [10,49,37,20,19]. Properties of policies are then checked using techniques to check confluence and termination of sets of rewrite rules.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In comparison, we allow a different class of constraints that we keep decidable by restricting to safe theories, and we use constraints in a rewriting context. Note that it is also possible to apply constraint narrowing to get analysis power as in [20].…”
Section: Related Workmentioning
confidence: 99%
“…• Verification of security policies [Kirchner et al, 2008] and cryptographic protocols . Narrowing is used to perform automated reasoning over suitable definitions, by means of rewriting rules, of 2 1.…”
Section: Resummentioning
confidence: 99%