Now showing items 1-9 of 9
A compositional event and time-based policy model
Analysis and run-time verification of dynamic security policies.
Quantitative quality assurance approach.
Software certification through quality profiling.
Concurrent enforcement of usage control policies.
A note on the formalisation of UCON.
(Association of Computing Machinery, 2007)
Deriving enforcement mechanisms for policies
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
Formality, Agility, Security and Evolution in Software Development
Combining formal and agile techniques in software development has the potential to minimize change-related problems.