Efficient symbolic automated analysis of administrative attribute-based RBAC-policies
暂无分享,去创建一个
[1] Jack Minker,et al. Logic and Databases: A Deductive Approach , 1984, CSUR.
[2] Ruzica Piskac,et al. Deciding Effectively Propositional Logic Using DPLL and Substitution Sets , 2010, Journal of Automated Reasoning.
[3] Ninghui Li,et al. Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.
[4] Alessandro Armando,et al. Automated Symbolic Analysis of ARBAC-Policies , 2010, STM.
[5] Silvio Ghilardi,et al. Towards SMT Model Checking of Array-Based Systems , 2008, IJCAR.
[6] C. R. Ramakrishnan,et al. Symbolic reachability analysis for parameterized administrative role-based access control , 2011, Comput. Secur..
[7] C. R. Ramakrishnan,et al. Policy Analysis for Administrative Role Based Access Control , 2006, CSFW.
[8] Silvio Ghilardi,et al. MCMT: A Model Checker Modulo Theories , 2010, IJCAR.
[9] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[10] Herbert B. Enderton,et al. A mathematical introduction to logic , 1972 .
[11] Somesh Jha,et al. Model checking SPKI/SDSI , 2004, J. Comput. Secur..
[12] Jason Crampton. Understanding and developing role-based administrative models , 2005, CCS '05.
[13] Christoph Weidenbach,et al. Superposition for Finite Domains , 2007 .
[14] Sofia Cassel,et al. Graph-Based Algorithms for Boolean Function Manipulation , 2012 .
[15] Ninghui Li,et al. Administration in role-based access control , 2007, ASIACCS '07.
[16] C. R. Ramakrishnan,et al. Efficient policy analysis for administrative role based access control , 2007, CCS '07.
[17] Andreas Schaad,et al. An administration concept for the enterprise role-based access control model , 2003, SACMAT '03.
[18] Mark Ryan,et al. Evaluating Access Control Policies Through Model Checking , 2005, ISC.
[19] Andreas Schaad,et al. A model-checking approach to analysing organisational controls in a loan origination process , 2006, SACMAT '06.