Amanote Research
Register
Sign In
Security Analysis of Role-Based Access Control Through Program Verification
doi 10.1109/csf.2012.28
Full Text
Open PDF
Abstract
Available in
full text
Date
June 1, 2012
Authors
Anna Lisa Ferrara
P. Madhusudan
Gennaro Parlato
Publisher
IEEE
Related search
Security Analysis for Temporal Role Based Access Control
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Towards Formal Verification of Role-Based Access Control Policies
IEEE Transactions on Dependable and Secure Computing
Electronic Engineering
Electrical
Computer Science
Use of Role Based Access Control for Security-Purpose Hypervisors
Early Validation and Verification of a Distributed Role-Based Access Control Model
Proceedings - Asia-Pacific Software Engineering Conference, APSEC
Software
Role-Based Access Control Consistency Validation
Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis
ACM SIGARCH Computer Architecture News
Rights Management for Role-Based Access Control
Role Hierarchies for Temporal Constraint Role-Based Access Control Model.
Journal of Computer Science and Cybernetics
Dynamic Access Control Policies: Specification and Verification
Computer Journal
Computer Science