Amanote Research

Amanote Research

    RegisterSign In

Security Analysis of Role-Based Access Control Through Program Verification

doi 10.1109/csf.2012.28
Full Text
Open PDF
Abstract

Available in full text

Date

June 1, 2012

Authors
Anna Lisa FerraraP. MadhusudanGennaro Parlato
Publisher

IEEE


Related search

Security Analysis for Temporal Role Based Access Control

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2014English

Towards Formal Verification of Role-Based Access Control Policies

IEEE Transactions on Dependable and Secure Computing
Electronic EngineeringElectricalComputer Science
2008English

Use of Role Based Access Control for Security-Purpose Hypervisors

2013English

Early Validation and Verification of a Distributed Role-Based Access Control Model

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
Software
2007English

Role-Based Access Control Consistency Validation

2006English

Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis

ACM SIGARCH Computer Architecture News
2017English

Rights Management for Role-Based Access Control

2008English

Role Hierarchies for Temporal Constraint Role-Based Access Control Model.

Journal of Computer Science and Cybernetics
2012English

Dynamic Access Control Policies: Specification and Verification

Computer Journal
Computer Science
2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy