Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.
DOI: 10.1109/icse.2005.1553562
|View full text |Cite
|
Sign up to set email alerts
|

Verification and change-impact analysis of access-control policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
133
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 108 publications
(133 citation statements)
references
References 17 publications
0
133
0
Order By: Relevance
“…Furthermore, these differences should be first-class objects, amenable to querying and verification just as policies are. The ability to analyze differences matters because authors can often state precise expectations of changes even if they cannot state global system properties, as Fisler et al [14] discuss. This is therefore an important problem for future work.…”
Section: Lemma 15mentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, these differences should be first-class objects, amenable to querying and verification just as policies are. The ability to analyze differences matters because authors can often state precise expectations of changes even if they cannot state global system properties, as Fisler et al [14] discuss. This is therefore an important problem for future work.…”
Section: Lemma 15mentioning
confidence: 99%
“…Fisler et al [14] have implemented both verification and semantic differencing for role-based policies, but their work handles only weaker (propositional rather than relational) policy models and ignores the impact of the dynamic environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Such holes typically cannot be identified by the imagination of designers; scarcely can they be detected by most of traditional approaches, such as static analysis [2,10] and policy-querying [14].…”
Section: Introductionmentioning
confidence: 99%
“…Fisler, Krishnamurthi, Meyerovich and Tschantz [14] have created Margrave, a software suite for analysing role based access control policies. Halpern and Weissman [19] have demonstrated how a fragment of first-order logic can be used to represent and reason about access control policies.…”
Section: Introductionmentioning
confidence: 99%