Stratified Abstraction of Access Control Policies
暂无分享,去创建一个
Cole Schlesinger | Ranjit Jhala | John D. Backes | Byron Cook | Andrew Gacek | Neha Rungta | Carsten Varming | John Backes | Ulises Berrueco | Tyler Bray | Daniel Brim | Kasper Luckow | Sean McLaughlin | Madhav Menon | Daniel Peebles | Ujjwal Pugalia | Adam Schodde | Anvesh Tanuku | Deepa Viswanathan | Cole Schlesinger | B. Cook | Ranjit Jhala | Neha Rungta | Sean McLaughlin | C. Varming | Andrew Gacek | Tyler Bray | K. S. Luckow | Daniel Peebles | Deepa Viswanathan | Ulises Berrueco | D. Brim | Madhav Menon | Ujjwal Pugalia | Adam Schodde | Anvesh Tanuku
[1] Pauline Bolignano,et al. Semantic-based Automated Reasoning for AWS Access Policies using SMT , 2018, 2018 Formal Methods in Computer Aided Design (FMCAD).
[2] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[4] Danfeng Zhang,et al. Ironclad Apps: End-to-End Security via Automated Full-System Verification , 2014, OSDI.
[5] Kathi Fisler,et al. The Margrave Tool for Firewall Analysis , 2010, LISA.
[6] Nikolaj Bjørner,et al. Automated Analysis and Debugging of Network Connectivity Policies , 2014 .
[7] Nikolaj Bjørner,et al. Checking Cloud Contracts in Microsoft Azure , 2015, ICDCIT.
[8] Jayadev Misra,et al. Assertion Graphs for Verifying and Synthesizing Programs , 1978 .
[9] Hassen Saïdi,et al. Construction of Abstract State Graphs with PVS , 1997, CAV.